Skip To Content

docx

School

Iowa State University *

*We aren’t endorsed by this school

Course

424A

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

9

Uploaded by years1hundred

Report
Skip To Content Dashboard Simon Pena Account Dashboard Courses Calendar Inbox History AU Help | AU-2023-OpenEnrollment-AIR-602S-20230101-02QuizzesLesson 1 Progress Check 2023 AU Open Enrollment Home Syllabus Announcements Modules
Assignments Grades 1 AU Library Lesson 1 Progress Check Due No due date Points 100 Questions 16 Time Limit 23 Minutes Allowed Attempts Unlimited Instructions This quiz checks your understanding of lesson concepts. This is a timed assessment. You are allowed multiple attempts. Minimum passing score is 80%. Attempt History Attempt Time Score LATEST Attempt 1 11 minutes 93.75 out of 100 Correct answers are hidden. Score for this attempt: 93.75 out of 100 Submitted Feb 11 at 8:26pm This attempt took 11 minutes. Question 1 6.25 / 6.25 pts
According to JP 1, Vol 1, the four instruments of national power are: Diplomatic, Social, Military, and Economic Diplomatic, Informational, Social, and Economic Social, Informational, Military, and Economic Diplomatic, Informational, Military, and Economic This answer is correct. Question 2 6.25 / 6.25 pts According to JP 1, Vol 1, the military instrument of national power can be applied in cooperation and competition to deter adversaries, but when conflict is inevitable, the military response ____________ is measured to change the enemy’s behavior through coercion or defeat the enemy completely through compellence. must use “overwhelming force,” but the United States must be prepared to “fix” what is “broken” when major combat operations are over must be measured, beginning with air and sea power, and if unsuccessful, then land power. must use “overwhelming force” to defeat the enemy. This answer is correct. Question 3 6.25 / 6.25 pts According to JP 1, Vol 1, what are the three ways to prevail in Armed Conflict? Exhaustion, Attrition, and Annihilation. Exhaustion, Attrition, and Defeat. Maneuver, Attrition, and Annihilation. Exhaustion, Maneuver, and Annihilation. This answer is correct.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 4 6.25 / 6.25 pts According to Major Holland’s article, “Kobayashi Maru delivers ‘coalition friendly’ Platform,” the Space Command and Control Program Office has just developed __________________ A cloud-native platform that leverages commercial best practices, cutting-edge deployment technologies and requisite security procedures to provide a resilient operational backbone in order to host coalition-focused Space C2 capabilities. A cloud-based platform developed by the Air Force computer scientists at Wright Patterson AFB that can communicate with both coalition and U.S. Space systems. A cloud-native platform called “Kobayashi Maru” that translates coalition security protocols into US secret-compatible code. A cloud-native platform that allows coalition space systems to host US space systems. This answer is correct. Question 5 6.25 / 6.25 pts According to Pettyjohn and Vick in The Posture Triangle: A New Framework for U.S. Air Force Global Presence, which of the following statements is most true concerning compensation driven access agreements? Negotiations are iterative; agreements will be characterized by increasingly short timelines, which enable the host nation to renegotiate often. The United States is well positioned, due to its status as the world’s sole superpower, to outbid other nations for basing rights. Such agreements offer access to countries which would otherwise be closed to the United States due to their government or political views. The United States can often negotiate long term access agreements with favorable terms for the provision of base support functions. This answer is correct. Question 6
6.25 / 6.25 pts In his article “To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation,” Lt Col Warner states that the key to PACAF’s successful contribution to Operation Damayan is a result of its _____________ Strategic 5-year plan. Contingency plan. Joint Strategic Capabilities Plan. Theater security cooperation line of operation. This answer is correct. Question 7 6.25 / 6.25 pts In his article “To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation,” Lt Col Warner explains that one key reason that air-centric theater security cooperation is well-suited for PACAF is __________________________________ airpower will be key to defending Taiwan. airpower is the vital to the war plans against North Korea. many of the world’s most capable air forces reside in PACAF’s area of responsibility. the extreme distances in the Asia-Pacific region are uniquely matched to airpower’s ability to get to a crisis location quickly. This answer is correct. Question 8 6.25 / 6.25 pts AFPD 3-14 Counterspace Operations states the basis of space superiority is _________________________ operating effectively within the space domain without prohibitive interference by opposing forces. operating effectively within the space domain due to counterspace actions by US and/or coalition partners.
operating with impunity in the space domain. operating effectively, but with some degradation due to interference by opposing forces. This answer is correct. Question 9 6.25 / 6.25 pts According to Lambakis, what is required for a deterrent effort to be credible with regard to space? Having actual, known retaliatory capabilities that may be employed in space or on earth. Improved resiliency of space systems using passive defenses, such as deception. Agreeing to stop missile defense research if China will dismantle its anti-satellite (ASAT) program. Making clear that a war in space need not result in a larger, more violent contest in other domains. This answer is correct. Question 10 6.25 / 6.25 pts According to Denning in “Rethinking the Cyber Domain and Deterrence”, which of the following unique characteristics make deterrence in cyberspace? It is difficult to attribute an attack to a specific perpetrator. Acquiring cyber weapons and conducting attacks is significantly easier compared to traditional forms of military power. Avoiding escalation is difficult in the cyber realm. All answers are correct. This answer is correct. Question 11 6.25 / 6.25 pts
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
In “Air Advising in Afghanistan,” Colonel Douglas and Dr. Ritschel point out that a couple of large impediments to innovation are __________________________________________ the USAF training model is very specific and inflexible. the Afghan culture that frowns on questioning authority as well as the previously adopted Soviet military model that, unlike many Western counterparts, is less flexible and more top-down driven. the lack of consistent funding and spare parts. the inexperience and enthusiasm of the younger Afghan aircrew. This answer is correct. Question 12 6.25 / 6.25 pts The 2017 OPERATION INHERENT RESOLVE Report to Congress listed “Security” as one of the key challenges, and within the “security” category, the key issues included _______________ feeding the hungry Iraqis. Iraq’s counter terrorism service needs rebuilding. demining all areas north of the Euphrates. reducing the amount of human trafficking. This answer is correct. IncorrectQuestion 13 0 / 6.25 pts According to Joint Publication 3-24, Counterinsurgency, how can air mobility “be used to support political goals”? By flying senior delegations, such as host nation leaders, over great distances quickly to conduct negotiations with insurgents. By forward-deploying heavy combat units to conduct COIN operations and foreign internal defense. By conducting show-of-force overflights and demonstrating coalition/host-nation solidarity. By extending effective governance to remote areas and delivering highly visible humanitarian aid.
This answer is incorrect. Please review Lesson 1, Objective 6. Question 14 6.25 / 6.25 pts According to Joint Publication 3-24, Counterinsurgency, how may air forces especially provide “considerable asymmetric advantages to counterinsurgents”? By denying insurgents the support of the local populace and access to WMDs. By denying insurgents secrecy and unfettered access to bases of operations. By denying insurgents a platform for propaganda and access to social media. By denying insurgents a recruitment pool and access to heavy weapons. This answer is correct. Question 15 6.25 / 6.25 pts According to Cohen's article "The Future of COIN," when considering Cyber operations, the Air Force’s _______________ and other electronic warfare assets must be factored into the COIN fight. EC-130H Compass Call EC-130J Commando Solo MC-130J Commando II HC-130P Combat King II This answer is correct. Question 16 6.25 / 6.25 pts During stability operations, coalition aircraft conduct periodic missions to eliminate suspected insurgent leaders and weapons caches. Which spacepower role is most associated with this effort? Satellite communications
Area of interest monitoring Warning of attack Enable precision strikes This answer is correct. Quiz Score: 93.75 out of 100 Last Attempt Details: Time: 11 minutes Current Score: 93.75 out of 100 Kept Score: 93.75 out of 100 Unlimited Attempts Take the Quiz Again (Will keep the highest of all your scores)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help