Welcome!

Enter a player name to begin or load your saved progress.

United States Cyber Command Wiki2Web Clarity Challenge

Home Return to Study Hints Random
Global Score: 0
Trophies: 0 🏆

‹ Back

Score: 0 / 100

Study Guide: United States Cyber Command: Structure, History, and Operations

Cheat Sheet:
United States Cyber Command: Structure, History, and Operations Study Guide

Genesis and Evolution of USCYBERCOM

USCYBERCOM was established as a fully independent command from its inception in 2010.

Answer: False

Explanation: USCYBERCOM was initially established as a sub-unified command under U.S. Strategic Command in 2010, prior to its later elevation to a unified combatant command.

Return to Game

The Cyber National Mission Force (CNMF) was activated before USCYBERCOM itself.

Answer: False

Explanation: USCYBERCOM was established in May 2010, while the Cyber National Mission Force (CNMF) was activated on January 27, 2014, making USCYBERCOM the earlier entity.

Return to Game

The U.S. Air Force established a permanent Cyber Command in 2008.

Answer: False

Explanation: The U.S. Air Force announced its intention to create a Cyber Command in 2006 and established one provisionally, but it was later announced in 2008 that it would not be brought into permanent activation.

Return to Game

The National Defense Authorization Act (NDAA) for fiscal year 2017 officially elevated USCYBERCOM to a unified combatant command.

Answer: True

Explanation: The National Defense Authorization Act for fiscal year 2017, enacted in late 2016, officially designated USCYBERCOM as a unified combatant command.

Return to Game

The establishment of USCYBERCOM has not influenced other nations to develop their own cyber warfare capabilities.

Answer: False

Explanation: The establishment of USCYBERCOM appears to have prompted other nations, such as South Korea and China, to develop or enhance their own cyber warfare commands and capabilities.

Return to Game

The Joint Task Force for Global Network Operations (JTF-GNO) was established after USCYBERCOM's creation.

Answer: False

Explanation: The Joint Task Force for Global Network Operations (JTF-GNO) was one of the organizations absorbed into USCYBERCOM upon its establishment in 2010, meaning it predated the command's full integration.

Return to Game

The Department of Defense Cyber Defense Command (DCDC) was established in 2015.

Answer: True

Explanation: The Department of Defense Cyber Defense Command (DCDC) was established as a standing joint task force in 2015.

Return to Game

President Trump's review of Cyber Command led to its elevation as a unified combatant command.

Answer: True

Explanation: During his presidency, Donald Trump initiated a review that resulted in the elevation of Cyber Command to the status of a unified combatant command.

Return to Game

The Goldwater-Nichols Act of 1986 reorganized the U.S. military structure to emphasize joint operations.

Answer: True

Explanation: The Goldwater-Nichols Act of 1986 significantly reformed the U.S. Armed Forces, placing a strong emphasis on joint operations and establishing the framework for modern unified combatant commands.

Return to Game

When was USCYBERCOM established, and where is its headquarters located?

Answer: Established on May 21, 2010, headquarters at Fort George G. Meade, Maryland.

Explanation: USCYBERCOM was established on May 21, 2010, and its headquarters are located at Fort George G. Meade, Maryland.

Return to Game

Which legislative act elevated USCYBERCOM to the status of a unified combatant command?

Answer: The National Defense Authorization Act (NDAA) for fiscal year 2017

Explanation: The National Defense Authorization Act (NDAA) for fiscal year 2017 officially elevated USCYBERCOM to the status of a unified combatant command.

Return to Game

What was the initial intention behind the creation of USCYBERCOM?

Answer: To unify direction of cyberspace operations with a primarily defensive mission.

Explanation: The initial intention behind USCYBERCOM's creation was to unify the direction of cyberspace operations within the DoD, with an emphasis on a primarily defensive mission.

Return to Game

What potential issue has been raised regarding the cultures of traditional military branches and cyber warfare?

Answer: Existing military cultures are seen by some as fundamentally incompatible with cyber warfare.

Explanation: Some perspectives suggest that the inherent cultures of traditional military branches may present fundamental incompatibilities with the unique demands and operational tempo of cyber warfare.

Return to Game

Which of the following organizations was absorbed into USCYBERCOM upon its establishment?

Answer: The Joint Task Force for Global Network Operations (JTF-GNO)

Explanation: Upon its establishment, USCYBERCOM absorbed organizations such as the Joint Task Force for Global Network Operations (JTF-GNO).

Return to Game

Mission, Strategy, and Operational Concepts

The primary operational focus of the United States Cyber Command (USCYBERCOM) is the defense of the Department of Defense's information networks.

Answer: False

Explanation: While defending DoD networks is a critical function, USCYBERCOM's mission encompasses a broader scope, including directing cyberspace operations and enabling actions across all domains, not solely defensive network protection.

Return to Game

USCYBERCOM's mission has consistently been perceived as purely defensive since its founding.

Answer: False

Explanation: While initially conceived with a defensive emphasis, USCYBERCOM's mission perception has evolved, increasingly encompassing offensive capabilities and a broader spectrum of cyber operations.

Return to Game

The sequence '9ec4c12949a4f31474f299058ce2b22a' in the USCYBERCOM emblem is a reference to the command's founding date.

Answer: False

Explanation: The sequence '9ec4c12949a4f31474f299058ce2b22a' is the MD5 hash of the command's mission statement, not a reference to its founding date.

Return to Game

USCYBERCOM aims to synchronize war-fighting effects by integrating existing cyberspace resources.

Answer: True

Explanation: A core objective of USCYBERCOM is to unify the direction of cyberspace operations, strengthen DoD cyber capabilities, and synchronize war-fighting effects by consolidating and leveraging existing cyberspace resources.

Return to Game

The CNMF exclusively conducts defensive cyber operations.

Answer: False

Explanation: The CNMF conducts both defensive and offensive cyber operations, including counter-ransomware operations and combating foreign malicious cyber actors.

Return to Game

The DoD's cyber strategy announced in July 2011 primarily focused on offensive cyber operations.

Answer: False

Explanation: The DoD's cyber strategy announced in July 2011 emphasized a primarily defensive approach, with pillars including active defenses, collective defense with allies, and reducing attacker advantages.

Return to Game

In June 2019, *The New York Times* reported that USCYBERCOM planted malware targeting the U.S. electrical grid.

Answer: False

Explanation: *The New York Times* reported in June 2019 that hackers associated with U.S. Cyber Command had potentially planted malware targeting Russia's electrical grid, not the U.S. grid.

Return to Game

Global hunt operations, initiated in 2018, are part of a strategy focused solely on reacting to identified cyber threats.

Answer: False

Explanation: Global hunt operations, initiated in 2018, are part of the 'persistent engagement' strategy, which emphasizes proactively identifying malicious cyber activity and vulnerabilities, rather than solely reacting.

Return to Game

USCYBERCOM's stated goal is to militarize cyberspace by establishing dominance over all network activity.

Answer: False

Explanation: USCYBERCOM's stated goal is to protect the nation's critical military information infrastructure and ensure freedom of action in cyberspace for the U.S. and its allies, rather than to militarize cyberspace or establish dominance over all network activity.

Return to Game

Achieving 'initial operating capability' (IOC) means a cyber unit is fully combat-ready.

Answer: False

Explanation: Initial Operating Capability (IOC) signifies that a unit meets the basic requirements to commence operations, but it does not equate to full combat readiness.

Return to Game

U.S. Cyber Command's 'global hunt operations' began in 2018 to identify vulnerabilities on networks worldwide.

Answer: True

Explanation: U.S. Cyber Command's 'global hunt operations' commenced in 2018 as part of the 'persistent engagement' strategy, aimed at proactively identifying malicious cyber activity and vulnerabilities on networks globally.

Return to Game

The 'persistent engagement' strategy aims to maintain a continuous, forward-leaning posture in cyberspace.

Answer: True

Explanation: The 'persistent engagement' strategy is designed to establish and maintain a continuous, proactive presence in cyberspace to identify and counter threats.

Return to Game

The Cyber Mission Force is designed solely for defensive cyber operations against domestic threats.

Answer: False

Explanation: The Cyber Mission Force is designed for a range of operations, including both defensive and offensive cyber operations, and its scope extends beyond solely domestic threats.

Return to Game

What is the primary purpose of the United States Cyber Command (USCYBERCOM)?

Answer: To unify the direction of cyberspace operations and strengthen DoD cyber capabilities.

Explanation: USCYBERCOM's primary purpose is to unify the direction of cyberspace operations, integrate and enhance the Department of Defense's cyber expertise, and strengthen its overall cyber capabilities.

Return to Game

How has the mission perception of USCYBERCOM changed over time?

Answer: It has evolved from an initially defensive mission to being increasingly viewed as an offensive force.

Explanation: USCYBERCOM's mission perception has evolved from an initial defensive focus to one that increasingly incorporates offensive capabilities, reflecting the dynamic nature of cyber warfare.

Return to Game

What does the MD5 hash ('9ec4c12949a4f31474f299058ce2b22a') found within the USCYBERCOM emblem represent?

Answer: The MD5 hash of the command's mission statement.

Explanation: The sequence '9ec4c12949a4f31474f299058ce2b22a' is the MD5 hash of the command's mission statement, embedded within the USCYBERCOM emblem.

Return to Game

What is the purpose of USCYBERCOM's 'global hunt operations' that began in 2018?

Answer: To proactively identify malicious cyber activity and vulnerabilities on networks globally.

Explanation: Global hunt operations, initiated in 2018, are designed to proactively identify malicious cyber activity and vulnerabilities across networks worldwide.

Return to Game

Which of the following is a stated pillar of the DoD's cyber strategy announced in July 2011?

Answer: Reducing the advantage of attackers on the internet.

Explanation: One of the stated pillars of the DoD's cyber strategy announced in July 2011 was to reduce the advantage of attackers on the internet.

Return to Game

What did *The New York Times* report regarding a USCYBERCOM operation against Russia's electrical grid?

Answer: Hackers associated with USCYBERCOM potentially planted malware targeting the grid.

Explanation: *The New York Times* reported that hackers linked to U.S. Cyber Command potentially planted malware targeting Russia's electrical grid.

Return to Game

What is the stated goal of USCYBERCOM concerning its role in cyberspace?

Answer: To protect the nation's critical military information infrastructure.

Explanation: The stated goal of USCYBERCOM is to protect the nation's critical military information infrastructure and ensure freedom of action in cyberspace for the U.S. and its allies.

Return to Game

What does the 'persistent engagement' strategy aim to achieve?

Answer: To maintain a continuous, proactive posture to identify and counter threats.

Explanation: The 'persistent engagement' strategy aims to maintain a continuous, forward-leaning posture in cyberspace, enabling the proactive identification and countering of threats.

Return to Game

What policy concerning offensive cyber operations against Russia was announced in February 2025?

Answer: A formal pause on offensive cyber operations.

Explanation: In February 2025, a formal pause on offensive cyber operations against Russia was announced, implementing new guidance for USCYBERCOM.

Return to Game

Organizational Structure and Component Commands

As of 2015, USCYBERCOM included 133 cyber teams, all dedicated solely to defending national networks.

Answer: False

Explanation: While USCYBERCOM had 133 cyber teams by 2015, these were categorized into National Mission Teams, Cyber Protection Teams, Combat Mission Teams, and Cyber Support Teams, with varied responsibilities beyond solely defending national networks.

Return to Game

National Mission Teams (NMT) are primarily focused on conducting offensive cyber attacks against adversaries.

Answer: False

Explanation: National Mission Teams are primarily tasked with defending the nation by identifying and defeating adversary cyber activity, rather than solely conducting offensive attacks.

Return to Game

U.S. Fleet Cyber Command / United States Tenth Fleet (FLTCYBER / 10F) is one of the three primary component commands of USCYBERCOM.

Answer: True

Explanation: U.S. Fleet Cyber Command / United States Tenth Fleet (FLTCYBER / 10F) is indeed one of the three principal component commands under USCYBERCOM.

Return to Game

The headquarters for all three primary component commands of USCYBERCOM are located at Fort George G. Meade, Maryland.

Answer: False

Explanation: While USCYBERCOM headquarters is at Fort Meade, only MARFORCYBER and FLTCYBER/10F are headquartered there. U.S. Army Cyber Command (ARCYBER) is headquartered at Fort Gordon, Georgia.

Return to Game

The CNMF has remained a small unit with only 21 teams since its activation in 2014.

Answer: False

Explanation: The CNMF initially comprised 21 teams but has since expanded significantly and was authorized to become a subordinate unified command under USCYBERCOM.

Return to Game

Cyber Protection Teams (CPTs) are primarily responsible for developing new cyber warfare technologies.

Answer: False

Explanation: Cyber Protection Teams (CPTs) are primarily tasked with defending priority Department of Defense networks and systems against significant threats, not developing new technologies.

Return to Game

Combat Mission Teams are responsible for providing analytic and planning support for cyber operations.

Answer: False

Explanation: Combat Mission Teams (CMTs) are responsible for conducting integrated cyberspace attacks, while Cyber Support Teams (CSTs) provide analytic and planning support.

Return to Game

The Sixteenth Air Force (Air Forces Cyber) operates under U.S. Space Command.

Answer: False

Explanation: The Sixteenth Air Force (Air Forces Cyber) operates as a component command under U.S. Cyber Command, not U.S. Space Command.

Return to Game

The National Guard Bureau is responsible for the strategic planning of all U.S. military operations.

Answer: False

Explanation: The National Guard Bureau oversees the Army National Guard and Air National Guard, which are reserve components. Strategic planning for all U.S. military operations involves higher echelons like the Joint Chiefs of Staff.

Return to Game

The U.S. Tenth Fleet is a subordinate command to the U.S. Navy's surface warfare division.

Answer: False

Explanation: The U.S. Tenth Fleet operates as U.S. Fleet Cyber Command (FLTCYBER) and is a component command of USCYBERCOM, not a subordinate division of the U.S. Navy's surface warfare.

Return to Game

Which of the following is NOT one of the three primary component commands of USCYBERCOM?

Answer: United States Space Command Cyber (SPACECOM Cyber)

Explanation: The three primary component commands of USCYBERCOM are ARCYBER, MARFORCYBER, and FLTCYBER/10F. SPACECOM Cyber is not listed as one of these primary components.

Return to Game

Where are the headquarters for Marine Corps Forces Cyberspace Command (MARFORCYBER) and U.S. Fleet Cyber Command located?

Answer: Fort Meade, Maryland

Explanation: The headquarters for both Marine Corps Forces Cyberspace Command (MARFORCYBER) and U.S. Fleet Cyber Command / U.S. Tenth Fleet are located at Fort George G. Meade, Maryland.

Return to Game

What is the primary role of the National Mission Teams (NMT) within USCYBERCOM?

Answer: To defend the nation by identifying and defeating adversary cyber activity.

Explanation: National Mission Teams are primarily responsible for defending the nation by identifying adversary cyber activity, blocking attacks, and maneuvering to defeat threats.

Return to Game

Which type of cyber team within USCYBERCOM is responsible for defending priority Department of Defense networks?

Answer: Cyber Protection Teams (CPT)

Explanation: Cyber Protection Teams (CPTs) are specifically tasked with defending priority Department of Defense networks and systems against significant threats.

Return to Game

What is the function of Cyber Support Teams (CST) within USCYBERCOM?

Answer: Providing analytic and planning support.

Explanation: Cyber Support Teams (CSTs) are responsible for providing analytic and planning support for cyber operations within USCYBERCOM.

Return to Game

Leadership, Personnel, and Inter-Agency Relationships

The Director of the National Security Agency (NSA) has always held a separate and distinct role from the commander of USCYBERCOM.

Answer: False

Explanation: Since its inception, the Director of the NSA has concurrently served as the commander of USCYBERCOM, a 'dual-hatted' arrangement signifying a close leadership integration.

Return to Game

Deputy Secretary of Defense William J. Lynn stated that USCYBERCOM is responsible for defending federal civilian networks ('.gov' domain).

Answer: False

Explanation: Deputy Secretary Lynn clarified that USCYBERCOM's responsibility is for DoD networks ('.mil' domain), while federal civilian networks ('.gov' domain) fall under the purview of the Department of Homeland Security.

Return to Game

The commander of U.S. Cyber Command must hold the rank of a three-star general or admiral.

Answer: False

Explanation: The commander of U.S. Cyber Command is required by statute to hold the rank of a four-star general or admiral.

Return to Game

The Defense Information Systems Agency (DISA) provides support for network and information assurance to USCYBERCOM.

Answer: True

Explanation: The Defense Information Systems Agency (DISA) offers technical assistance for network and information assurance to USCYBERCOM, further integrating its functions with the command's operations.

Return to Game

The NSA's role is minimal, providing only basic network infrastructure support to USCYBERCOM.

Answer: False

Explanation: The NSA plays a crucial role, providing significant support through its networks and expertise, further underscored by the dual-hatted leadership structure connecting the NSA Director and USCYBERCOM commander.

Return to Game

The 'dual-hatted' arrangement means the USCYBERCOM commander also leads the Joint Chiefs of Staff.

Answer: False

Explanation: The 'dual-hatted' arrangement signifies that the commander of USCYBERCOM also serves as the Director of the National Security Agency (NSA), not as the leader of the Joint Chiefs of Staff.

Return to Game

The Joint Chiefs of Staff primarily advise the Secretary of Defense on logistical matters.

Answer: False

Explanation: The Joint Chiefs of Staff serve as principal military advisors to the President and Secretary of Defense on a broad range of strategic military matters, not exclusively logistical issues.

Return to Game

USCYBERCOM can assist civilian agencies like DHS in defending critical networks only under specific executive orders.

Answer: True

Explanation: While USCYBERCOM's primary focus is DoD networks, its assistance to civilian agencies like DHS in defending critical infrastructure can occur under specific circumstances, often guided by executive orders or policy directives.

Return to Game

The Defense Contract Management Agency (DCMA) is primarily responsible for providing cyber defense training to military personnel.

Answer: False

Explanation: The Defense Contract Management Agency (DCMA) is responsible for overseeing defense contracts, not for providing cyber defense training to military personnel.

Return to Game

What close organizational relationship exists between USCYBERCOM and the NSA?

Answer: The Director of the NSA has concurrently served as the commander of USCYBERCOM since its inception.

Explanation: The Director of the NSA has concurrently served as the commander of USCYBERCOM since the command's inception, reflecting a significant integration between the two organizations.

Return to Game

According to Deputy Secretary of Defense William J. Lynn, who is responsible for the defense of federal civilian networks ('.gov' domain)?

Answer: The Department of Homeland Security (DHS)

Explanation: Deputy Secretary of Defense William J. Lynn clarified that the Department of Homeland Security (DHS) is responsible for the defense of federal civilian networks ('.gov' domain).

Return to Game

Which organization provides technical assistance for network and information assurance to USCYBERCOM?

Answer: Defense Information Systems Agency (DISA)

Explanation: The Defense Information Systems Agency (DISA) provides essential technical support for network and information assurance to USCYBERCOM.

Return to Game

What does the 'dual-hatted' arrangement for the commander of USCYBERCOM signify?

Answer: The commander also serves as the Director of the National Security Agency (NSA).

Explanation: The 'dual-hatted' arrangement signifies that the commander of USCYBERCOM also holds the position of Director of the National Security Agency (NSA).

Return to Game

What is the required rank for the commander of U.S. Cyber Command?

Answer: A four-star general or admiral.

Explanation: The commander of U.S. Cyber Command is required by statute to hold the rank of a four-star general or admiral.

Return to Game

Historical Milestones and Key Figures

General Keith Alexander advocated for a strictly reactive approach to cyber threats, waiting for attacks to occur before responding.

Answer: False

Explanation: General Keith Alexander advocated for a proactive stance, emphasizing the need to respond to and counter cyber threats, including those from unknown attackers, rather than solely reacting.

Return to Game

Major Robert Costa proposed the creation of an Information (Cyber) Service as a sixth branch of the military in 2002.

Answer: True

Explanation: In 2002, Major Robert Costa put forth the proposal for an Information (Cyber) Service to be considered as a potential sixth branch of the U.S. military.

Return to Game

General Alexander believed the U.S. should only respond to cyber attacks when the attacker's identity is definitively known.

Answer: False

Explanation: General Alexander advocated for swift and strong responses to cyber attacks, even when the attacker's identity was not definitively known, emphasizing the need to counter threats proactively.

Return to Game

A classified cyberwar exercise in 2013 found that active duty cyber warriors significantly outperformed reserve officers.

Answer: False

Explanation: A classified cyberwar exercise in 2013 reportedly found that reserve officers with civilian cyber-security experience outperformed active duty cyber warriors.

Return to Game

General Keith B. Alexander served as the first commander of USCYBERCOM.

Answer: True

Explanation: General Keith B. Alexander was indeed the first commander of U.S. Cyber Command, serving from its establishment in May 2010 until March 2014.

Return to Game

The Commission on Enhancing National Cybersecurity released its final report in December 2016.

Answer: True

Explanation: The Commission on Enhancing National Cybersecurity, established to develop recommendations for protecting cyberspace, published its final report in December 2016.

Return to Game

General Alexander argued against responding to cyber attacks from unknown attackers.

Answer: False

Explanation: General Alexander argued for proactive responses to cyber attacks, even when the attacker's identity was unknown, emphasizing the need to counter threats effectively.

Return to Game

What was the outcome of the 2013 classified cyberwar exercise involving reserve officers?

Answer: Reserve officers with civilian cyber-security experience reportedly outperformed active duty cyber warriors.

Explanation: A classified cyberwar exercise in 2013 indicated that reserve officers possessing extensive civilian cyber-security experience demonstrated superior performance compared to active duty cyber warriors.

Return to Game

Who proposed the creation of an 'Information (Cyber) Service' as a potential sixth branch of the military?

Answer: Major Robert Costa

Explanation: Major Robert Costa proposed the creation of an 'Information (Cyber) Service' as a potential sixth branch of the military in 2002.

Return to Game