1. |
What is meant by adhere, as a minimum, to the 1/3 - 2/3 rule? |
|
Commanders should use only one-third of the time available for planning and allow two-thirds of the time for subordinates to prepare. |
2. |
In contrast to hasty attacks, what are deliberate attacks? |
|
In contrast to hasty attacks, deliberate attacks are fully synchronized operations that employ every available asset against the enemy's defense. |
3. |
The TF scheme of maneuver for a deliberate attack employs three elements. What are they? |
|
Normally, the TF scheme of maneuver for a deliberate attack employs three elements: main attack, supporting attack, and reserve. |
4. |
Follow-and-support forces assist attacking units by relieving them of tasks that would otherwise slow their advance. These tasks include: |
|
Follow-on forces will –
- Destroying bypassed pockets of resistance.
- Relieving elements of the attacking force that have been left to block or contain enemy forces.
- Securing the flanks of a penetration to prevent the enemy from closing it.
- Expanding the area of the penetration by breaking through other enemy defenses.
- Securing lines of communications.
- Securing key terrain overrun or bypassed by the attacking unit
- Protecting key installations.
- Guarding prisoners of war.
|
5. |
Offensive IPB, coupled with aggressive reconnaissance, provides the commander the following information: |
|
The IPB, coupled with aggressive reconnaissance, provides the commander the following information:
- Location of existing and reinforcing obstacles.
- Enemy positions and orientations.
- Enemy intent based on his dispositions.
- Avenues of approach to exploit enemy weaknesses.
- Likely courses of action for employment of enemy reserves, counterattacking forces, and CS assets.
(Appendix C, page C-21)
|
6. |
What are the engineer considerations in the deliberate attack? |
|
The engineer considerations in a deliberate attack are –
- Support well forward.
- Obstacle responsibility.
- Flank security.
- Logistical sustainment.
|
7. |
Deliberate attack plans include Situational obstacles to cover dangerous counterattack and flank-attack routes into the maneuver force's area of operations. |
8. |
All placement of flank and hasty defense obstacles will be controlled with the use of obstacle belts and groups as subsets of the obstacle zones. |
9. |
Reconnaissance is always conducted to verify, extend, and modify the engineer picture of the battlefield developed during the EBA. |
10. |
What are the four types of breaching obstacles? |
|
The four types of breaching are in-stride, deliberate, assault, and covert. |