HIUS 380 Quiz 8
HIUS 380 Quiz 8 The War Continues and Cyber-Hybrid Warfare
- The increased use of Special Operations within the context of the war in the Greater Middle East increasingly saw the use of what command?
- The first use of cyber space to inflict physical damage on the Iranian nuclear arms program was:
- What areas of the world have the Russians recently been involved in?
- seemed to offer a democratic alternative to the backwards leadership of the nations in the CENTCOM area as responsibility began to spread.
- The form of cyber attack compared into the text to a line of musket fire putting out a maximum amount of firepower with a minimum of accuracy and control is the:
- A precise cyber-attack compared in the text to a frontier woodsmen with rifle would be:
- In 2011 Operation ODYSSEY DAWN used American military power in an attempt to eliminate:
- The Department of Defense now consists of nine unified commands, of these how many are geographic and how many are considered functional?
- The Chinese government encouraged non-governmental computer smart citizens or ____________ to attack American websites in mass.
- The author argues the American military is in the process of fighting a “generational war” where?
- Where have the Chinese have a great interest in obtaining minerals and controlling the electromagnetic spectrum?
- What did the Global War on Terror became known as after 2009?
- What American military units have participated in partnerships with mentor armies in African nations in an attempt to prevent insurgencies?
- In 1986 Operation EL DORADO CANYON used American military power in an attempt to eliminate:
- What movement appeared to have emerged from the ashes of Al Qaeda?
Set 2
- What did the Global War on Terror became known as after 2009?
- The author argues the American military is in the process of fighting a “generational war” where?
- The recent social changes to the military have included:
- Once again the United States found itself engaged in Somalia in an attempt to control another Al Qaeda offshoot called:
- A precise cyber-attack compared in the text to a frontier woodsmen with rifle would be:
- What areas of the world have the Russians recently been involved in?
- What American military units have participated in partnerships with mentor armies in African nations in an attempt to prevent insurgencies?
- The increased use of Special Operations within the context of the war in the Greater Middle East increasingly saw the use of what command?
- The Chinese government encouraged non-governmental computer smart citizens or ____________ to attack American websites in mass.
- seemed to offer a democratic alternative to the backwards leadership of the nations in the CENTCOM area as responsibility began to spread.
- The Department of Defense now consists of nine unified commands, of these how many are geographic and how many are considered functional?
- The first use of cyber space to inflict physical damage on the Iranian nuclear arms program was:
- The MQ-1 unmanned aerial vehicle has become the weapon of choice since 2001:
- In 2011 Operation ODYSSEY DAWN used American military power in an attempt to eliminate:
- The frontiers / global challenge (s) identified in this chapter include: