Enter a player name to begin or load your saved progress.
USCYBERCOM was established as a fully independent command from its inception in 2010.
Answer: False
Explanation: USCYBERCOM was initially established as a sub-unified command under U.S. Strategic Command in 2010, prior to its later elevation to a unified combatant command.
The Cyber National Mission Force (CNMF) was activated before USCYBERCOM itself.
Answer: False
Explanation: USCYBERCOM was established in May 2010, while the Cyber National Mission Force (CNMF) was activated on January 27, 2014, making USCYBERCOM the earlier entity.
The U.S. Air Force established a permanent Cyber Command in 2008.
Answer: False
Explanation: The U.S. Air Force announced its intention to create a Cyber Command in 2006 and established one provisionally, but it was later announced in 2008 that it would not be brought into permanent activation.
The National Defense Authorization Act (NDAA) for fiscal year 2017 officially elevated USCYBERCOM to a unified combatant command.
Answer: True
Explanation: The National Defense Authorization Act for fiscal year 2017, enacted in late 2016, officially designated USCYBERCOM as a unified combatant command.
The establishment of USCYBERCOM has not influenced other nations to develop their own cyber warfare capabilities.
Answer: False
Explanation: The establishment of USCYBERCOM appears to have prompted other nations, such as South Korea and China, to develop or enhance their own cyber warfare commands and capabilities.
The Joint Task Force for Global Network Operations (JTF-GNO) was established after USCYBERCOM's creation.
Answer: False
Explanation: The Joint Task Force for Global Network Operations (JTF-GNO) was one of the organizations absorbed into USCYBERCOM upon its establishment in 2010, meaning it predated the command's full integration.
The Department of Defense Cyber Defense Command (DCDC) was established in 2015.
Answer: True
Explanation: The Department of Defense Cyber Defense Command (DCDC) was established as a standing joint task force in 2015.
President Trump's review of Cyber Command led to its elevation as a unified combatant command.
Answer: True
Explanation: During his presidency, Donald Trump initiated a review that resulted in the elevation of Cyber Command to the status of a unified combatant command.
The Goldwater-Nichols Act of 1986 reorganized the U.S. military structure to emphasize joint operations.
Answer: True
Explanation: The Goldwater-Nichols Act of 1986 significantly reformed the U.S. Armed Forces, placing a strong emphasis on joint operations and establishing the framework for modern unified combatant commands.
When was USCYBERCOM established, and where is its headquarters located?
Answer: Established on May 21, 2010, headquarters at Fort George G. Meade, Maryland.
Explanation: USCYBERCOM was established on May 21, 2010, and its headquarters are located at Fort George G. Meade, Maryland.
Which legislative act elevated USCYBERCOM to the status of a unified combatant command?
Answer: The National Defense Authorization Act (NDAA) for fiscal year 2017
Explanation: The National Defense Authorization Act (NDAA) for fiscal year 2017 officially elevated USCYBERCOM to the status of a unified combatant command.
What was the initial intention behind the creation of USCYBERCOM?
Answer: To unify direction of cyberspace operations with a primarily defensive mission.
Explanation: The initial intention behind USCYBERCOM's creation was to unify the direction of cyberspace operations within the DoD, with an emphasis on a primarily defensive mission.
What potential issue has been raised regarding the cultures of traditional military branches and cyber warfare?
Answer: Existing military cultures are seen by some as fundamentally incompatible with cyber warfare.
Explanation: Some perspectives suggest that the inherent cultures of traditional military branches may present fundamental incompatibilities with the unique demands and operational tempo of cyber warfare.
Which of the following organizations was absorbed into USCYBERCOM upon its establishment?
Answer: The Joint Task Force for Global Network Operations (JTF-GNO)
Explanation: Upon its establishment, USCYBERCOM absorbed organizations such as the Joint Task Force for Global Network Operations (JTF-GNO).
The primary operational focus of the United States Cyber Command (USCYBERCOM) is the defense of the Department of Defense's information networks.
Answer: False
Explanation: While defending DoD networks is a critical function, USCYBERCOM's mission encompasses a broader scope, including directing cyberspace operations and enabling actions across all domains, not solely defensive network protection.
USCYBERCOM's mission has consistently been perceived as purely defensive since its founding.
Answer: False
Explanation: While initially conceived with a defensive emphasis, USCYBERCOM's mission perception has evolved, increasingly encompassing offensive capabilities and a broader spectrum of cyber operations.
The sequence '9ec4c12949a4f31474f299058ce2b22a' in the USCYBERCOM emblem is a reference to the command's founding date.
Answer: False
Explanation: The sequence '9ec4c12949a4f31474f299058ce2b22a' is the MD5 hash of the command's mission statement, not a reference to its founding date.
USCYBERCOM aims to synchronize war-fighting effects by integrating existing cyberspace resources.
Answer: True
Explanation: A core objective of USCYBERCOM is to unify the direction of cyberspace operations, strengthen DoD cyber capabilities, and synchronize war-fighting effects by consolidating and leveraging existing cyberspace resources.
The CNMF exclusively conducts defensive cyber operations.
Answer: False
Explanation: The CNMF conducts both defensive and offensive cyber operations, including counter-ransomware operations and combating foreign malicious cyber actors.
The DoD's cyber strategy announced in July 2011 primarily focused on offensive cyber operations.
Answer: False
Explanation: The DoD's cyber strategy announced in July 2011 emphasized a primarily defensive approach, with pillars including active defenses, collective defense with allies, and reducing attacker advantages.
In June 2019, *The New York Times* reported that USCYBERCOM planted malware targeting the U.S. electrical grid.
Answer: False
Explanation: *The New York Times* reported in June 2019 that hackers associated with U.S. Cyber Command had potentially planted malware targeting Russia's electrical grid, not the U.S. grid.
Global hunt operations, initiated in 2018, are part of a strategy focused solely on reacting to identified cyber threats.
Answer: False
Explanation: Global hunt operations, initiated in 2018, are part of the 'persistent engagement' strategy, which emphasizes proactively identifying malicious cyber activity and vulnerabilities, rather than solely reacting.
USCYBERCOM's stated goal is to militarize cyberspace by establishing dominance over all network activity.
Answer: False
Explanation: USCYBERCOM's stated goal is to protect the nation's critical military information infrastructure and ensure freedom of action in cyberspace for the U.S. and its allies, rather than to militarize cyberspace or establish dominance over all network activity.
Achieving 'initial operating capability' (IOC) means a cyber unit is fully combat-ready.
Answer: False
Explanation: Initial Operating Capability (IOC) signifies that a unit meets the basic requirements to commence operations, but it does not equate to full combat readiness.
U.S. Cyber Command's 'global hunt operations' began in 2018 to identify vulnerabilities on networks worldwide.
Answer: True
Explanation: U.S. Cyber Command's 'global hunt operations' commenced in 2018 as part of the 'persistent engagement' strategy, aimed at proactively identifying malicious cyber activity and vulnerabilities on networks globally.
The 'persistent engagement' strategy aims to maintain a continuous, forward-leaning posture in cyberspace.
Answer: True
Explanation: The 'persistent engagement' strategy is designed to establish and maintain a continuous, proactive presence in cyberspace to identify and counter threats.
The Cyber Mission Force is designed solely for defensive cyber operations against domestic threats.
Answer: False
Explanation: The Cyber Mission Force is designed for a range of operations, including both defensive and offensive cyber operations, and its scope extends beyond solely domestic threats.
What is the primary purpose of the United States Cyber Command (USCYBERCOM)?
Answer: To unify the direction of cyberspace operations and strengthen DoD cyber capabilities.
Explanation: USCYBERCOM's primary purpose is to unify the direction of cyberspace operations, integrate and enhance the Department of Defense's cyber expertise, and strengthen its overall cyber capabilities.
How has the mission perception of USCYBERCOM changed over time?
Answer: It has evolved from an initially defensive mission to being increasingly viewed as an offensive force.
Explanation: USCYBERCOM's mission perception has evolved from an initial defensive focus to one that increasingly incorporates offensive capabilities, reflecting the dynamic nature of cyber warfare.
What does the MD5 hash ('9ec4c12949a4f31474f299058ce2b22a') found within the USCYBERCOM emblem represent?
Answer: The MD5 hash of the command's mission statement.
Explanation: The sequence '9ec4c12949a4f31474f299058ce2b22a' is the MD5 hash of the command's mission statement, embedded within the USCYBERCOM emblem.
What is the purpose of USCYBERCOM's 'global hunt operations' that began in 2018?
Answer: To proactively identify malicious cyber activity and vulnerabilities on networks globally.
Explanation: Global hunt operations, initiated in 2018, are designed to proactively identify malicious cyber activity and vulnerabilities across networks worldwide.
Which of the following is a stated pillar of the DoD's cyber strategy announced in July 2011?
Answer: Reducing the advantage of attackers on the internet.
Explanation: One of the stated pillars of the DoD's cyber strategy announced in July 2011 was to reduce the advantage of attackers on the internet.
What did *The New York Times* report regarding a USCYBERCOM operation against Russia's electrical grid?
Answer: Hackers associated with USCYBERCOM potentially planted malware targeting the grid.
Explanation: *The New York Times* reported that hackers linked to U.S. Cyber Command potentially planted malware targeting Russia's electrical grid.
What is the stated goal of USCYBERCOM concerning its role in cyberspace?
Answer: To protect the nation's critical military information infrastructure.
Explanation: The stated goal of USCYBERCOM is to protect the nation's critical military information infrastructure and ensure freedom of action in cyberspace for the U.S. and its allies.
What does the 'persistent engagement' strategy aim to achieve?
Answer: To maintain a continuous, proactive posture to identify and counter threats.
Explanation: The 'persistent engagement' strategy aims to maintain a continuous, forward-leaning posture in cyberspace, enabling the proactive identification and countering of threats.
What policy concerning offensive cyber operations against Russia was announced in February 2025?
Answer: A formal pause on offensive cyber operations.
Explanation: In February 2025, a formal pause on offensive cyber operations against Russia was announced, implementing new guidance for USCYBERCOM.
As of 2015, USCYBERCOM included 133 cyber teams, all dedicated solely to defending national networks.
Answer: False
Explanation: While USCYBERCOM had 133 cyber teams by 2015, these were categorized into National Mission Teams, Cyber Protection Teams, Combat Mission Teams, and Cyber Support Teams, with varied responsibilities beyond solely defending national networks.
National Mission Teams (NMT) are primarily focused on conducting offensive cyber attacks against adversaries.
Answer: False
Explanation: National Mission Teams are primarily tasked with defending the nation by identifying and defeating adversary cyber activity, rather than solely conducting offensive attacks.
U.S. Fleet Cyber Command / United States Tenth Fleet (FLTCYBER / 10F) is one of the three primary component commands of USCYBERCOM.
Answer: True
Explanation: U.S. Fleet Cyber Command / United States Tenth Fleet (FLTCYBER / 10F) is indeed one of the three principal component commands under USCYBERCOM.
The headquarters for all three primary component commands of USCYBERCOM are located at Fort George G. Meade, Maryland.
Answer: False
Explanation: While USCYBERCOM headquarters is at Fort Meade, only MARFORCYBER and FLTCYBER/10F are headquartered there. U.S. Army Cyber Command (ARCYBER) is headquartered at Fort Gordon, Georgia.
The CNMF has remained a small unit with only 21 teams since its activation in 2014.
Answer: False
Explanation: The CNMF initially comprised 21 teams but has since expanded significantly and was authorized to become a subordinate unified command under USCYBERCOM.
Cyber Protection Teams (CPTs) are primarily responsible for developing new cyber warfare technologies.
Answer: False
Explanation: Cyber Protection Teams (CPTs) are primarily tasked with defending priority Department of Defense networks and systems against significant threats, not developing new technologies.
Combat Mission Teams are responsible for providing analytic and planning support for cyber operations.
Answer: False
Explanation: Combat Mission Teams (CMTs) are responsible for conducting integrated cyberspace attacks, while Cyber Support Teams (CSTs) provide analytic and planning support.
The Sixteenth Air Force (Air Forces Cyber) operates under U.S. Space Command.
Answer: False
Explanation: The Sixteenth Air Force (Air Forces Cyber) operates as a component command under U.S. Cyber Command, not U.S. Space Command.
The National Guard Bureau is responsible for the strategic planning of all U.S. military operations.
Answer: False
Explanation: The National Guard Bureau oversees the Army National Guard and Air National Guard, which are reserve components. Strategic planning for all U.S. military operations involves higher echelons like the Joint Chiefs of Staff.
The U.S. Tenth Fleet is a subordinate command to the U.S. Navy's surface warfare division.
Answer: False
Explanation: The U.S. Tenth Fleet operates as U.S. Fleet Cyber Command (FLTCYBER) and is a component command of USCYBERCOM, not a subordinate division of the U.S. Navy's surface warfare.
Which of the following is NOT one of the three primary component commands of USCYBERCOM?
Answer: United States Space Command Cyber (SPACECOM Cyber)
Explanation: The three primary component commands of USCYBERCOM are ARCYBER, MARFORCYBER, and FLTCYBER/10F. SPACECOM Cyber is not listed as one of these primary components.
Where are the headquarters for Marine Corps Forces Cyberspace Command (MARFORCYBER) and U.S. Fleet Cyber Command located?
Answer: Fort Meade, Maryland
Explanation: The headquarters for both Marine Corps Forces Cyberspace Command (MARFORCYBER) and U.S. Fleet Cyber Command / U.S. Tenth Fleet are located at Fort George G. Meade, Maryland.
What is the primary role of the National Mission Teams (NMT) within USCYBERCOM?
Answer: To defend the nation by identifying and defeating adversary cyber activity.
Explanation: National Mission Teams are primarily responsible for defending the nation by identifying adversary cyber activity, blocking attacks, and maneuvering to defeat threats.
Which type of cyber team within USCYBERCOM is responsible for defending priority Department of Defense networks?
Answer: Cyber Protection Teams (CPT)
Explanation: Cyber Protection Teams (CPTs) are specifically tasked with defending priority Department of Defense networks and systems against significant threats.
What is the function of Cyber Support Teams (CST) within USCYBERCOM?
Answer: Providing analytic and planning support.
Explanation: Cyber Support Teams (CSTs) are responsible for providing analytic and planning support for cyber operations within USCYBERCOM.
The Director of the National Security Agency (NSA) has always held a separate and distinct role from the commander of USCYBERCOM.
Answer: False
Explanation: Since its inception, the Director of the NSA has concurrently served as the commander of USCYBERCOM, a 'dual-hatted' arrangement signifying a close leadership integration.
Deputy Secretary of Defense William J. Lynn stated that USCYBERCOM is responsible for defending federal civilian networks ('.gov' domain).
Answer: False
Explanation: Deputy Secretary Lynn clarified that USCYBERCOM's responsibility is for DoD networks ('.mil' domain), while federal civilian networks ('.gov' domain) fall under the purview of the Department of Homeland Security.
The commander of U.S. Cyber Command must hold the rank of a three-star general or admiral.
Answer: False
Explanation: The commander of U.S. Cyber Command is required by statute to hold the rank of a four-star general or admiral.
The Defense Information Systems Agency (DISA) provides support for network and information assurance to USCYBERCOM.
Answer: True
Explanation: The Defense Information Systems Agency (DISA) offers technical assistance for network and information assurance to USCYBERCOM, further integrating its functions with the command's operations.
The NSA's role is minimal, providing only basic network infrastructure support to USCYBERCOM.
Answer: False
Explanation: The NSA plays a crucial role, providing significant support through its networks and expertise, further underscored by the dual-hatted leadership structure connecting the NSA Director and USCYBERCOM commander.
The 'dual-hatted' arrangement means the USCYBERCOM commander also leads the Joint Chiefs of Staff.
Answer: False
Explanation: The 'dual-hatted' arrangement signifies that the commander of USCYBERCOM also serves as the Director of the National Security Agency (NSA), not as the leader of the Joint Chiefs of Staff.
The Joint Chiefs of Staff primarily advise the Secretary of Defense on logistical matters.
Answer: False
Explanation: The Joint Chiefs of Staff serve as principal military advisors to the President and Secretary of Defense on a broad range of strategic military matters, not exclusively logistical issues.
USCYBERCOM can assist civilian agencies like DHS in defending critical networks only under specific executive orders.
Answer: True
Explanation: While USCYBERCOM's primary focus is DoD networks, its assistance to civilian agencies like DHS in defending critical infrastructure can occur under specific circumstances, often guided by executive orders or policy directives.
The Defense Contract Management Agency (DCMA) is primarily responsible for providing cyber defense training to military personnel.
Answer: False
Explanation: The Defense Contract Management Agency (DCMA) is responsible for overseeing defense contracts, not for providing cyber defense training to military personnel.
What close organizational relationship exists between USCYBERCOM and the NSA?
Answer: The Director of the NSA has concurrently served as the commander of USCYBERCOM since its inception.
Explanation: The Director of the NSA has concurrently served as the commander of USCYBERCOM since the command's inception, reflecting a significant integration between the two organizations.
According to Deputy Secretary of Defense William J. Lynn, who is responsible for the defense of federal civilian networks ('.gov' domain)?
Answer: The Department of Homeland Security (DHS)
Explanation: Deputy Secretary of Defense William J. Lynn clarified that the Department of Homeland Security (DHS) is responsible for the defense of federal civilian networks ('.gov' domain).
Which organization provides technical assistance for network and information assurance to USCYBERCOM?
Answer: Defense Information Systems Agency (DISA)
Explanation: The Defense Information Systems Agency (DISA) provides essential technical support for network and information assurance to USCYBERCOM.
What does the 'dual-hatted' arrangement for the commander of USCYBERCOM signify?
Answer: The commander also serves as the Director of the National Security Agency (NSA).
Explanation: The 'dual-hatted' arrangement signifies that the commander of USCYBERCOM also holds the position of Director of the National Security Agency (NSA).
What is the required rank for the commander of U.S. Cyber Command?
Answer: A four-star general or admiral.
Explanation: The commander of U.S. Cyber Command is required by statute to hold the rank of a four-star general or admiral.
General Keith Alexander advocated for a strictly reactive approach to cyber threats, waiting for attacks to occur before responding.
Answer: False
Explanation: General Keith Alexander advocated for a proactive stance, emphasizing the need to respond to and counter cyber threats, including those from unknown attackers, rather than solely reacting.
Major Robert Costa proposed the creation of an Information (Cyber) Service as a sixth branch of the military in 2002.
Answer: True
Explanation: In 2002, Major Robert Costa put forth the proposal for an Information (Cyber) Service to be considered as a potential sixth branch of the U.S. military.
General Alexander believed the U.S. should only respond to cyber attacks when the attacker's identity is definitively known.
Answer: False
Explanation: General Alexander advocated for swift and strong responses to cyber attacks, even when the attacker's identity was not definitively known, emphasizing the need to counter threats proactively.
A classified cyberwar exercise in 2013 found that active duty cyber warriors significantly outperformed reserve officers.
Answer: False
Explanation: A classified cyberwar exercise in 2013 reportedly found that reserve officers with civilian cyber-security experience outperformed active duty cyber warriors.
General Keith B. Alexander served as the first commander of USCYBERCOM.
Answer: True
Explanation: General Keith B. Alexander was indeed the first commander of U.S. Cyber Command, serving from its establishment in May 2010 until March 2014.
The Commission on Enhancing National Cybersecurity released its final report in December 2016.
Answer: True
Explanation: The Commission on Enhancing National Cybersecurity, established to develop recommendations for protecting cyberspace, published its final report in December 2016.
General Alexander argued against responding to cyber attacks from unknown attackers.
Answer: False
Explanation: General Alexander argued for proactive responses to cyber attacks, even when the attacker's identity was unknown, emphasizing the need to counter threats effectively.
What was the outcome of the 2013 classified cyberwar exercise involving reserve officers?
Answer: Reserve officers with civilian cyber-security experience reportedly outperformed active duty cyber warriors.
Explanation: A classified cyberwar exercise in 2013 indicated that reserve officers possessing extensive civilian cyber-security experience demonstrated superior performance compared to active duty cyber warriors.
Who proposed the creation of an 'Information (Cyber) Service' as a potential sixth branch of the military?
Answer: Major Robert Costa
Explanation: Major Robert Costa proposed the creation of an 'Information (Cyber) Service' as a potential sixth branch of the military in 2002.