Cyber Protection Team (CPT) Functions and Operations

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

Which CPT function focuses on proactively searching networks to detect evidence of MCA?

Get a hint
Hint

Hunt

Get a hint
Hint

Who specializes in reporting operational data for analysis in USCYBERCOM?

Get a hint
Hint

All Source Analyst

Card Sorting

1/30

Anonymous user
Anonymous user
flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to Cyber Protection Team functions, operational procedures, and training requirements.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Which CPT function focuses on proactively searching networks to detect evidence of MCA?

Hunt

2
New cards

Who specializes in reporting operational data for analysis in USCYBERCOM?

All Source Analyst

3
New cards

What is NOT a capability of the Deployable Interceptor Platform (DIP)?

Employable as a stand-alone analysis station

4
New cards

What program ensures proficiency through regular mission-related repetitions?

Ready Cybercrew Program (RCP)

5
New cards

What evaluation is performed to ensure basic qualification in a weapon system?

Qualification (QUAL) evaluation

6
New cards

Which document contains weapon system capabilities and limitations?

AFTTP 3-3 CVA/H

7
New cards

What is a capability of a Host Analyst?

Utilized for incident investigations and counter threat actions on specific host systems.

8
New cards

Who is responsible for ensuring cybercrew discipline and addressing misconduct?

Mission Lead and/or Crew Lead

9
New cards

What is the Current Read File of CIF messages containing temporary operation information?

Part B

10
New cards

What is NOT a function of the weapons and tactics shop?

Manage instructors to provide training to operators

11
New cards

Who authorizes the DACO and delegates authority for military operations in cyberspace?

Commander, United States Cyber Command (USCYBERCOM)

12
New cards

What primarily consists of servers and sensors?

Deployable Interceptor Platform (DIP) components

13
New cards

Which DCO missions may occur without the owner's permission?

Defensive Cyberspace Operations - Response Actions (RA)

14
New cards

What document contains the table of contents for CIF?

Part A

15
New cards

What DCO missions include authorized defensive actions within the defended network?

Defensive Cyberspace Operations - Internal Defensive Measures (DCO-IDM)

16
New cards

What must be submitted prior to using third-party compiled code not on ATO?

Weapon System Deviation (Deviation Request)

17
New cards

What is an agent-based host analysis tool?

Endgame

18
New cards

Which tool is NOT part of the Sysinternals suite?

Volatility

19
New cards

What is the purpose of the crew log during a mission?

Maintain an accurate record of all significant events.

20
New cards

What work role assesses the configuration of targeted host systems?

Host Analyst

21
New cards

How many hours should the normal crew duty period not exceed?

12 hours

22
New cards

What type of training is needed for major modifications to the CVA/H weapon system?

Difference Training

23
New cards

When must crew position qualification evaluations be completed?

By the last day of the 17th month after completing the performance phase.

24
New cards

What is Part C of the CIF?

Contains information temporary in nature not required before missions.

25
New cards

Can your crew lead direct you to change the MAC address during an ops check?

True

26
New cards

What communication tool reports events outside expected parameters?

Situation report (SITREP)

27
New cards

What is the tasked window for executing specific missions on the MPNET?

Vulnerability

28
New cards

What indicates friendly actions for task accomplishment?

Measures of Performance (MOP)

29
New cards

Which of the following CPT functions is focused primarily on targeting and engaging MCA in order to eliminate or neutralize it from a network or system?

Clear

30
New cards

What are the responsibilities of the Network Analyst crew position?

Specializes in advanced vulnerabilities and threats of network architectures, technologies and associated systems

31
New cards