CDASA Topic 8
Exploitation of adversary equipment, excluding computer storage media, video and digital recording media, and media equipment is
... [Show More] performed in the CCMD with the support of subordinate service centers-T/F? Answer:- True
Service S&TI centers play a critical roe in processing, exploiting, and analyzing SIGINT data- T/F? Answer:- False- TECH*-INT data.
Geospatial information provides the basic framework for visualizing the operational environment-T/F? Answer:- True
IMINT may not be used to update databases resident with Global Command and Control SystemIntegrated Imagery and Intelligence (GCCS-I3)-T/F? Answer:- False-IMINT may* be used.
When properly maintained and ready for access, BLANK enables area familiarization, area monitoring for I&W, feasibility assessment, preliminary planning, peacetime operations, and emergency operations worldwide. (type of INT) Answer:- GEOINT
Maker's information needs with individualized information concerning events, ideology, and persons of interest. Answer:- ??????? this was all that was on the card
BLANK results from the collection, processing, analysis, and interpretation of forensic material and data as well as. associated contextual data. This informs a decision. Answer:- Forensic Enabled Intelligence (FEI)
Applied BLANK supports the identification of individuals and their disposition at the point of encounter. Answer:- Biometric Enabled Intelligence (IBEI)
BLANK is an application that assists in the exploitation of captured documents and media, that when processed may provide valuable information such as adversary plans, intentions, locations, capabilities, and status. Answer:- Document and Media Exploitation (DOMEX)
BLANK operations process results in discovery of true identities, links identities to events, coating and networks, and reveals hostile intent. These outputs enable tasks, missions, and actions that span the range of military operations. Answer:- I2 (identity intelligence)
BLANK conducts operations to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, wastage, or assassinations conducted for or on behalf of foreign powers, organizations , or persons or their agents, or international terrorist organizations or activities. Answer:- Counterintelligence [Show Less]