CDC 3P051 Vol 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Quinesha_16
Q
Quinesha_16
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,061
Questions: 20 | Attempts: 1,061

SettingsSettingsSettings
CDC Quizzes & Trivia

CDC pretest test baic on the job knowledge for airman to get their 5 skill level.


Questions and Answers
  • 1. 

    What action or initiative provides the means for joint forces to dictate battle ship operations?

    • A.

      Mass

    • B.

      Objective

    • C.

      Offensive

    • D.

      Maneuver

    Correct Answer
    C. Offensive
    Explanation
    The correct answer is Offensive. Offensive action or initiative provides the means for joint forces to dictate battle ship operations. By taking the offensive, forces can seize the initiative, control the tempo of operations, and force the enemy to react to their actions. This allows them to set the terms of the battle and dictate the course of action. Offensive operations are essential for achieving victory and maintaining control over the battlefield.

    Rate this question:

  • 2. 

    One of the ways responsivness is recived is through

    • A.

      Fairly acurate communications

    • B.

      Rehersing your plan of attack

    • C.

      Early detection of the treat

    • D.

      Timely intelligence

    Correct Answer
    C. Early detection of the treat
    Explanation
    Early detection of the threat is one of the ways responsiveness is achieved. By identifying and recognizing potential threats or risks at an early stage, individuals or organizations can take prompt actions to mitigate or address them effectively. This allows for proactive measures to be implemented, reducing the impact and potential harm caused by the threat. Early detection enables timely decision-making and response, ensuring that necessary actions are taken to protect and maintain safety, security, and overall operational efficiency.

    Rate this question:

  • 3. 

    How many  basic fundimentals of base defense are there

    • A.

      1

    • B.

      3

    • C.

      5

    • D.

      7

    Correct Answer
    C. 5
    Explanation
    There are five basic fundamentals of base defense.

    Rate this question:

  • 4. 

    For defense to be effective it must have

    • A.

      Aggresivness

    • B.

      Key terrain

    • C.

      Integration

    • D.

      Depth

    Correct Answer
    D. Depth
    Explanation
    Defense must have depth in order to be effective. Depth refers to the ability of a defensive system to withstand and absorb attacks, as well as the ability to counterattack and regain lost ground. It involves having multiple layers of defense, such as fortified positions or reserves, that can be used to slow down and weaken enemy forces. Depth also allows for flexibility and the ability to adapt to changing battlefield conditions. Without depth, a defense can easily be overwhelmed and breached by the enemy.

    Rate this question:

  • 5. 

    Whic Priciple of Millitary operations other then war (MOOTW) applies appropriate millitary cappability prudently

    • A.

      Objective

    • B.

      Unity of command

    • C.

      Restraint

    • D.

      Legitamicy

    Correct Answer
    C. Restraint
    Explanation
    Restraint is the correct answer because in military operations other than war (MOOTW), it is essential to exercise caution and use military capabilities judiciously. Restraint involves avoiding excessive use of force and minimizing collateral damage, while still achieving the desired objectives. This principle ensures that military actions are proportionate and conducted within the boundaries of international law and ethical considerations. By exercising restraint, military forces can maintain the support and legitimacy of the local population and international community, ultimately contributing to the success of the mission.

    Rate this question:

  • 6. 

    How many types of millitary operations other then war (MOOTW) do not involve combat.

    • A.

      2

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    A. 2
    Explanation
    Military Operations Other Than War (MOOTW) refer to military activities that do not involve direct combat. These operations are usually carried out in situations where armed conflict is not the primary objective. Examples of MOOTW include humanitarian aid, disaster relief, peacekeeping, and counterterrorism efforts. The correct answer, 2, suggests that there are only two types of MOOTW that do not involve combat, indicating that the majority of MOOTW activities do involve some form of combat or military action.

    Rate this question:

  • 7. 

    Which (MOOTHW) use physical presence to demostrate US resolve.

    • A.

      Arms control

    • B.

      Show of force

    • C.

      Enforcment sanctions

    • D.

      Foreign humanitarian assistance

    Correct Answer
    B. Show of force
    Explanation
    A "show of force" refers to a military action or demonstration that is intended to display the strength and determination of a country or organization. It involves physically showcasing military capabilities and presence to convey a message of resolve and deter potential adversaries. This can be done through military exercises, deployments, or demonstrations of firepower. By conducting a show of force, the United States aims to exhibit its power and determination to protect its interests and maintain peace and stability in the face of potential threats.

    Rate this question:

  • 8. 

    What is the lead agency for terroist that occur outside the US

    • A.

      Department of state

    • B.

      Department of Justice

    • C.

      Department of Defense

    • D.

      Central intteligence agency

    Correct Answer
    A. Department of state
    Explanation
    The Department of State is the lead agency for terrorist incidents that occur outside the US. This is because the Department of State is responsible for the overall foreign policy and international relations of the United States. They have the primary responsibility for representing the US abroad and coordinating efforts with other countries to combat terrorism. The Department of State works closely with other agencies, such as the Department of Defense and the Central Intelligence Agency, to gather intelligence, provide diplomatic solutions, and ensure the safety and security of US citizens abroad.

    Rate this question:

  • 9. 

    What is the lead agency for teroist incidents that occur inside the US

    • A.

      Department of state

    • B.

      Department of Justice

    • C.

      Department of Defense

    • D.

      Central intelligence agency

    Correct Answer
    B. Department of Justice
    Explanation
    The Department of Justice is the correct answer because it is the lead agency responsible for investigating and prosecuting terrorist incidents that occur within the United States. The department's main focus is to enforce federal laws and ensure public safety, making it the appropriate agency to handle domestic terrorism cases. The Department of State primarily deals with foreign policy and international relations, while the Department of Defense focuses on military operations. The Central Intelligence Agency (CIA) primarily deals with gathering intelligence and conducting covert operations overseas.

    Rate this question:

  • 10. 

    Which Terrorist group operates independently

    • A.

      State supported

    • B.

      Non state supported

    • C.

      State directed

    • D.

      Indipendint crusaders

    Correct Answer
    A. State supported
    Explanation
    The correct answer is "State supported." This means that the terrorist group in question receives assistance or backing from a specific government or state. This support can come in various forms, such as funding, training, weapons, or safe havens. It implies that the terrorist group operates with the knowledge and consent of the supporting state, and may even carry out attacks on behalf of that state's interests.

    Rate this question:

  • 11. 

    Which terrorist group operates autonomousley

    • A.

      State directed

    • B.

      State- supported

    • C.

      Non state supported

    • D.

      Independent crusaders

    Correct Answer
    C. Non state supported
    Explanation
    Non state supported terrorist groups operate independently, without any direct support or control from any state. They are not backed or funded by any government and carry out their activities autonomously. These groups typically have their own agenda and motivations, which may include political, religious, or ideological goals. Unlike state-directed or state-supported terrorist groups, non state supported groups do not have the backing or resources of a government, making them more difficult to track and combat.

    Rate this question:

  • 12. 

    Which terrorist group operates as an agent of the govt

    • A.

      State directed

    • B.

      State supported

    • C.

      Non state supported

    • D.

      Independent crusaders

    Correct Answer
    A. State directed
    Explanation
    The correct answer is "State directed." This means that the terrorist group operates as an agent of the government. In other words, the government is directly involved in directing and controlling the activities of the terrorist group. This could be for various reasons, such as using the group to carry out covert operations or to destabilize other countries.

    Rate this question:

  • 13. 

    What treat assesment factor exist when there are confirmed intentions of a terrorist group

    • A.

      Intentions

    • B.

      Existance

    • C.

      Targeting

    • D.

      Capbility

    Correct Answer
    C. Targeting
    Explanation
    When there are confirmed intentions of a terrorist group, the treat assessment factors that exist are targeting, existence, and capability. Targeting refers to the specific individuals, groups, or locations that the terrorist group intends to attack. Existence refers to the confirmed presence and activities of the terrorist group. Capability refers to the resources, skills, and weapons that the group possesses to carry out their intended attacks. These factors are important in assessing the level of threat posed by the terrorist group and formulating appropriate counter-terrorism strategies.

    Rate this question:

  • 14. 

    Existance or capability must be present, and history may or may not be present in treat level

    • A.

      Critcal

    • B.

      High

    • C.

      Med

    • D.

      Low

    Correct Answer
    D. Low
    Explanation
    This answer suggests that the level of existence or capability must be present in the treatment, but the presence of history is not necessary. Therefore, the level of existence or capability in the treatment is low.

    Rate this question:

  • 15. 

    Which of the following security disciplines is closley corrdinated with Operation security (OPSEC)

    • A.

      Information security

    • B.

      Resource Protection

    • C.

      Industrial Security

    • D.

      Intranet Security

    Correct Answer
    A. Information security
    Explanation
    Operation security (OPSEC) focuses on protecting critical information from being compromised by identifying and mitigating potential risks. Information security, on the other hand, involves the protection of information from unauthorized access, use, disclosure, disruption, modification, or destruction. Both disciplines are closely related as they aim to safeguard sensitive information and ensure its confidentiality, integrity, and availability. Therefore, information security is closely coordinated with OPSEC to ensure the overall protection of critical information.

    Rate this question:

  • 16. 

    Eying explotation of open source information is the primary focus  of OPSEC

    • A.

      Security

    • B.

      Warfare

    • C.

      Analysis

    • D.

      Intelligence

    Correct Answer
    C. Analysis
    Explanation
    The statement suggests that the primary focus of OPSEC (Operations Security) is to analyze and exploit open source information. OPSEC is a process used to identify and protect critical information that could be used by adversaries to compromise security. Analysis involves examining and interpreting data to gain insights and make informed decisions. By analyzing open source information, OPSEC practitioners can identify potential vulnerabilities and develop strategies to mitigate risks and enhance security measures. Therefore, analysis aligns with the primary focus of OPSEC.

    Rate this question:

  • 17. 

    OPSEC enables friendly force information superiorty by

    • A.

      Attacking advisory information systems with virus

    • B.

      Neutralizing advisory information activities

    • C.

      Randomly inspecting opsec programs

    • D.

      Controlling the output of information

    Correct Answer
    B. Neutralizing advisory information activities
    Explanation
    OPSEC enables friendly force information superiority by neutralizing advisory information activities. This means that OPSEC helps to counter or eliminate any activities or efforts made by adversaries to gather information about friendly forces. By neutralizing these activities, OPSEC ensures that sensitive information is protected and not disclosed to the enemy, thus maintaining the advantage and superiority of friendly forces in terms of information.

    Rate this question:

  • 18. 

    Specific items of information are usually olny critical for a pescribed

    • A.

      Time phased classification

    • B.

      Monthly inspection

    • C.

      Period of time

    • D.

      Limitation

    Correct Answer
    C. Period of time
    Explanation
    Specific items of information are typically only important or crucial for a certain period of time. This suggests that the relevance or significance of these items diminishes or becomes less important after a certain timeframe. Therefore, the correct answer is "period of time."

    Rate this question:

  • 19. 

    The centerpiece of OPSEC is

    • A.

      Threat analysis

    • B.

      Risk managment

    • C.

      Communications safety

    • D.

      Information security

    Correct Answer
    B. Risk managment
    Explanation
    The correct answer is risk management. OPSEC (Operations Security) is a systematic approach used to identify, analyze, and mitigate risks to protect sensitive information and operations. While threat analysis, communications safety, and information security are all important components of OPSEC, the centerpiece is risk management. This involves assessing potential risks and vulnerabilities, developing strategies to minimize or eliminate them, and implementing controls and safeguards to protect assets and maintain operational security.

    Rate this question:

  • 20. 

    Masking and controlling friendly actions to prevent the collection of critical information is

    • A.

      Firewall protection

    • B.

      Primary goal of OPSEC

    • C.

      The role informatin warfare

    • D.

      Primary role of security forces

    Correct Answer
    B. Primary goal of OPSEC
    Explanation
    The primary goal of OPSEC (Operations Security) is to mask and control friendly actions to prevent the collection of critical information. OPSEC involves identifying and protecting sensitive information that could be exploited by adversaries. By implementing measures to limit the disclosure of information, OPSEC aims to maintain operational security and prevent potential threats or attacks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 22, 2010
    Quiz Created by
    Quinesha_16
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.