Comprehensive Guide to Military Land Operations
LAND OPERATIONS
1. How could ground operations be characterized?
R – They can have an offensive or defensive character.
2. What is offensive?
R – To attack and exploit the weaknesses of the enemy and keep the initiative.
3. What are the purposes of the offensive?
R –
- To destroy enemy forces or material
- To seize areas or important points on the ground
- To obtain information
- To disorganize the enemy’s attack
4. What are the stages of the offensive?
R – Preparation, Execution, and Follow-up (PEC)
5. This phase shall commence with the receipt of the policy, which will launch the operation to occupy a Position of Attack (PaTQo) and subsequent implementation of a Starting Line (LP):
A – Preparation
6. At this stage, there is the march to the battle, in which the attacking force seeks to establish contact with the enemy, then moving from the Assembly Area (ZREU) and/or implementing PaTQo, the Starting Line, and Line of Contact (LC) (early play):
R – Preparation
7. This phase begins with the crossing of an LP or Line of Contact (LC) to conquer the enemy target and resources from the tasks specified in the policy assigned mission:
R – Execution
8. How does the Army progress in the case of a night attack?
R – Under the protection of fire from supporting arms (the troops progress until the assault positions (past), or Line of Probable Development (LPD)).
9. When do you raid?
R – As soon as the supporting arms’ fire has moved to the rear and flanks of the enemy position (not to jeopardize the assault).
10. Does the assault stop at the edge of the previous objective?
A – No, on the contrary, it moves with speed in a single move, or performing fire and movement techniques when enemy resistance so requires, until the rear edge or the designated part.
11. What must the combatant comply with to ensure the speed of the assault?
R –
- Skill with weapons
- Exploration and use of covered shelters
- Attacking without relying on verbal commands or visual cues
- Joining forces to ease the isolation of the fight simply by talking to the fighter at his side
12. Why is the commander of a small fraction positioned in front of the most advanced?
R – To lead the assault with tactically safe and floppy drive displacements, eliminating confusion in the transmission of orders and unnecessary delays.
13. It is the phase in which there follows a series of actions aimed at consolidating its possession after the conquest of the objective:
R – Follow-up
14. What do we observe shortly after the attack?
R – The attack must be followed by an aggressive exploitation of success.
15. And when there are indications that the enemy’s resistance is crumbling?
R – The attack and exploitation of success turns into persecution, for the destruction of enemy troops.
16. What types of offensive operations are there? MRAAP
– March to the fight adopt the bill. success
– Recognition in force recogn.
– Coordinated attack march w/ coordinated attack
– Exploiting the successful fight persecution
– Pursuit
17. March to the fight:
– It is an operation that aims to establish, as soon as possible, contact with the enemy or restores it when lost.
– It ends with the occupation of a region or predetermined positions when the enemy’s resistance impedes movement, forcing the deployment of troops.
18. Tactical troop formations in offensive operations?
R – Running column, tactical column, and approach march
19. March column?
– Used when contact with the enemy is remote.
– Prevails to accelerate the movement.
– The shift is done by roads and motor.
20. – Used when contact with the enemy is unlikely, and administrative and tactical considerations exist in parallel:
R – Tactical column
21. The army is organized for the fighter to allow early entry into action in the face of any interference from the enemy:
R – Tactical column
22. Employed where imminent action of the enemy is expected:
R – Running approach
23. There are tactical considerations, and troops will be deployed progressively as it foreshadows contact:
R – Running approach
24. What is fighting against?
R – It consists of the action that occurs when a force in motion, not deployed for battle, engages with enemy troops, moving or still, over which it has adequate information.
25. How should it be avoided?
R – Through security features ahead.
26. It is an operation with a limited purpose, seeking to reveal and test the device and the value of the enemy in a certain position or information:
R – Reconnaissance in force
27. It is the main type of offensive operation and is characterized by the coordinated employment of maneuver and fire support to close on the enemy, destroy it, or neutralize it:
R – Coordinated Attack
28. It is usually used against organized enemy positions or fortified and requires adequate air support:
R – Coordinated Attack
29. It may be preceded by a march of approach and/or reconnaissance in force and be implemented aggressively:
R – Coordinated Attack
30. It is the aggressive continuation of a successful attack:
R – Exploiting the successful
31. It begins when we see that the enemy is having difficulties in maintaining a defensive position:
– Exploitation of success
32. Its purpose is to destroy the enemy’s ability to resist attack and to reorganize or make an ordered retrograde movement:
R – Exploiting the successful
33. When does the exploitation of success turn into harassment?
– When the enemy shows signs of disorganization, and his troops break up under the pressure of continued attack.
34. It is an operation designed to destroy an enemy army that is in the process of disengagement or tries to escape:
R – Pursuit
35. What is the difference between exploitation of success and persecution?
Exploitation of success aims to complete the destruction of enemy troops, while persecution aims to render the enemy unable to influence the situation and force them to act according to the pursuing troops’ actions.
36. What are the forms of offensive tactical maneuvers?
– Penetration
– Frontal attack
– Envelopment
– Turning movement
37. The main attack (AtqPcp) is directed against a full opening of the enemy’s defensive position to break their device, divide it, and defeat it by the parties:
R – Penetration
38. The device does not have accessible and/or vulnerable enemy flanks:
R – Penetration
39. Not enough time to mount another form of maneuver:
R – Penetration
40. The enemy is deploying on a large front:
R – Penetration
41. There are weaknesses in the defensive position:
R – Penetration
42. The land and observation are favorable to the attacker:
R – Penetration
43. There is availability of strong support from peor:
R – Penetration
44. What are the three stages of penetration?
– Disruption of the enemy’s advanced defensive position
– Extension and maintenance of the breach
– Acquisition and retention of objectives to break the continuity of the enemy defense and create an opportunity for the exploitation of success
45. In this form of maneuver, the attack deals with the entire front of the enemy defensive position with the same intensity:
R – Frontal Attack
46. It is the least desirable maneuver to be performed because the enemy will be able to apply their maximum firepower across the front of the attacking force:
– Frontal Attack
47. In this form of tactical maneuver, the attack spills or bypasses, by land or air, the main defensive positions of the enemy to achieve an objective at the rear of their device:
– Envelopment
48. This maneuver seeks to avoid a decisive engagement with the major portion of the defensive system, hitting them where they are weaker, disrupting their command system, communications, logistics, and means of fire support, and cutting their withdrawal routes by imposing a wreck in position:
R – Envelopment
49. It is the form of tactical maneuver that offers the best opportunity to achieve success and tends to decrease the number of casualties among the attackers:
R – Envelopment
50. It is a variant of the envelopment in which the attacker attempts to bypass both flanks of the enemy position simultaneously:
R – Double envelopment
51. It is difficult to control and requires great superiority of combat power and mobility:
R – Double envelopment
52. It is similar to the envelopment as a form of tactical offensive, as the attacker, through a secondary action, fixes the enemy while the bulk bypasses their positions:
– Envelopment with movement technique
53. This form of action bypasses the main attack by land or air, the defensive positions of the enemy, to conquer objectives deep in their rear:
– Turning movement
54. This maneuver forces the defender to leave his position to make the threat environment. The enemy is then engaged in a place chosen by the attacker:
– Turning movement
OFFENSIVE OPERATIONS IN LOW VISIBILITY CONDITIONS
1. What are the purposes of offensive operations in low visibility?
R – They can be made to:
– Achieve surprise and exploit psychological conditions.
– Keep pressure, continuing an attack and/or exploitation of success.
– Seize areas necessary to perform further actions.
– Clear less combat power, especially in airborne and armored.
– Reduce a strong defensive position.
– Attract the enemy’s attention to a certain area.
2. What are the benefits during periods of reduced visibility?
R –
– Achieve surprise
– Hide the progression of the troop
– Reduce the search for targets by the enemy
– Hinder mutual support by the defender
– Facilitate the use of reserves
3. And the disadvantages?
R –
– The need for detailed planning
– Well-trained troops
– Difficulty in exercising command and control, guidance, and conduct of fire
– Distinction of troops
– Decrease in the effectiveness of the attacking force’s fires
4. What types of night attacks are there?
R – Illuminated, unilluminated, and unsupported.
5. Are those artificially lit. This includes projectors, grenades, illuminated rockets, and artifacts launched from aircraft?
R – Illuminated attack
6. What are the advantages of this night attack?
R –
– Achievement of deep objectives
– Effective support of armored vehicles
– Helps speed up the attack
– Performance of engineering tasks
– Passing obstacles
– Ease of command and control
– Increased effectiveness of fires
7. When is lighting used?
R – Usually against a strong defensive position.
8. What are the disadvantages of this type of night attack?
R –
– Decreases surprise
– Requires special artifacts
– Exposes the attacker to enemy fire
– Facilitates the movement of enemy reserves
– An artifact is released by parachute. It can head to the attacker’s side due to wind action.
9. Is an attack whose realization depends on the aid of night vision equipment:
R – Unilluminated attacks
10. Are those where support weapons are used in the preparation of the attack?
R – Supported attacks
11. How is fire support planned and controlled?
R – As in daytime attacks, considering the difficulties of adjusting fire in the face of weather conditions and available equipment.
12. When will the fires be started on request?
R – Right after the loss of surprise
13. Are those where fires do not occur in preparation:
R – Unsupported attacks
14. What are the characteristics of the night attack?
R –
– Decreased effectiveness of direct fire marksmanship
– Increased close combat and shooting tethered
– Difficulty of shifting and conservation of direction, action, command, control, and connection
– Surprise and shock action
– The objective should be small to be gained
– Attributed to only one objective in an attack
MEASURES OF COORDINATION AND CONTROL
15. What are the measures of coordination and control in night attacks?
R –
– Time of Attack
– Position of Attack (PaTQo)
– Crossing Point (PPsg)
– Line of Departure (LP)
– Release Points (PLIB)
– Probable Line of Development (LPD)
– Objective (Obj)
– Boundary Line of Progression (LLP)
16. Is usually selected to provide the greatest chance of obtaining surprise?
R – Time of Attack
17. What is the time when a troop won a favorable means to trigger a daylight raid?
R – It will be released in the final hours of darkness so as not to give the enemy enough time to reorganize and deal with the daylight raid.
18. In the night attack, the measure of coordination and control should be located perpendicular to the direction of travel magazine, whose identification at night is properly identified and mapped out?
R – Position of Attack
19. Used to indicate where a unit crosses the lines of a friendly power (LC, LAAD, PAC) to the beginning of an infiltration of an operation under low visibility of an amount or a host. It is represented graphically by a circle similar to the control points, with the abbreviation PPsg inside:
R – Crossing Point
20. Given the reduced visibility, greater care is required in selecting and marking the LP. If possible, the Line of Contact (LC) or the previous position of Attack should be used. The troops will cross in the column will be marked out just the point:
R – Line of Departure
21. Are set by the upper echelon from the assembly area (ZREU) and should be sufficiently separated to allow each fraction of the lateral movement necessary to follow your route:
R – Release Point
22. To that extent of coordination. The fraction is developed fully and partly to the final attack on the objective. It should be easily identifiable at night or properly marked out and, preferably, perpendicular to the position of attack:
R – Probable Line of Development
23. Where is the Probable Line of Development located?
R – Between 100 to 200 meters from the enemy’s position to enable the adoption of the device in line for the assault.
24. Should be easily identifiable at night and located on land in favor of rapprochement. Usually have smaller dimensions than in a daytime attack?
R – Objective
25. Used to monitor the progress of the fractions and avoid being hit by the fires of protection designed to isolate the objective. It must cover the flanks of the objective and be easily identifiable at night:
R – Boundary Line of Progression (LLP)
LPD LP LLP
TIME PaTQo
PLibGC
Column column PlibPel online
PREPARATION FOR THE NIGHT ATTACK
26. How should I prepare the ZREU held at the GC operations in low visibility?
R – They are similar to those of a daylight raid, and the master of the GC must be concerned with security.
27. What are the preparations for implementing a night attack?
– Conduct rehearsals
– Rest before the attack
– Disposal of unnecessary equipment (to be returned)
– Individual camouflage
– Inspection of men and equipment (maintenance of lights and noise)
– If using reconnaissance elements, reduce the effective minimum.
– Maintenance of weapons locked during displacement
28. What is the sequence of implementation of a night attack?
P –
– Progression to the PlibGC
– Progression from PlibGC to the LPD
– Assault
– Consolidation and reorganization
29. What is the training that spans the GC LP?
R – Column, because this is the device that allows a greater degree of control.
30. How far is training kept in the column?
R – Until the PlibGC, i.e., forced the development of the troops by the action of the enemy.
31. In a night attack, how should the advancement of troops to the point of release of GC be?
R – The advance will be slow, silent, and stealthy, guided by one of the members of the security patrols moved forward to maintain the thrust of progression.
32. How will the progression from PlibGC to the LPD be?
R – The GC will progress, still led by a guide, to reach its position at LPD, where it will complete its development.
33. And when it is fully developed?
R – Ready to give the CmtPelFuzNav, on whose order the GC will continue its silent motion, keeping the lineup and regulating their progress by the GC base.
60. Attack on a built-up area (3 phases):
– Isolation of the location
– Conquest of an area on the edge
– Progression through the built-up area
61. Will be achieved through the conquest of capital accidents that dominate the access road to the town and is planned in the form of a coordinated attack designed to enable and support the other phases, and especially to prevent or hinder the arrival of enemy reinforcements:
– Isolation of the town
62. Seeks to eliminate or reduce the Earth observation and the firing of the enemy on the access routes that require the region, providing a stage for the company that will invest in the marked area:
– Conquest of the area on the periphery
63. Consists of the advance within the city:
– Progression through the built-up area
64. It’s an area that contains numerous defensive works, arranged in width and depth:
– Fortified area
65. Is the form of tactical maneuver in the walled:
– Penetration
66. Implementation of the waterway (two types):
– Implementation of opportunity
– Crossing of the main force
67. It is one in which the waterway is not upheld (although in hostile territory):
– Crossing of opportunity
68. It is one in which the territory is defended:
– Crossing of the main force (immediate and prepared)
69. And that drove up in a transaction without the army losing its pulse:
– Immediate crossing of the main force
70. That is conducted after detailed planning for the implementation of extensive preparations to concentrate combat power to continue the attack on the other side of the margin:
– Prepared crossing of the main force
DEFENSIVE OPERATIONS
71. Is the use of combat power to maintain ownership of an area or the integrity or strength of a facility and create more favorable conditions for defensive action:
R – Defensive operation
72. What is the main purpose of the defensive operation?
R – To defeat an enemy attack, containing, repelling, or destroying their troops.
73. The secondary purpose?
R –
– To buy time until the arrival of new media
– To save means of a sector to concentrate combat power for decisive action
– To control critical points and/or deeper objectives
74. Types of defensive operations?
R –
– Defense in one or more positions
– Retrograde movements
75. The defending troops seek to engage the enemy in an area previously held in width and depth, hindering or stopping their progression, forward or in depth, and every opportunity to disorganize them, wear them down, or destroy their forces:
R – Defense in one or more positions
76. The army seeks to avoid decisive combat under unfavorable conditions, breaking contact with the enemy, slowing them down, trading space for time, while avoiding engaging in actions that could compromise the integrity of the force:
R – Retrograde movements
77. What are the fundamentals of defensive?
R –
– Appropriate use of the land
– Dispersion
– Security
– Integration and coordination of actions
– Mutual support
– Time available
– All-around defense
– Defense in depth
– Flexibility
– Maximum use of offensive action
78. The defender must deploy their troops based mainly on the ground. Keep track of accidents essential to observation, communications, and movements in reserves and will deny the enemy use of terrain that threatens the success of the defense:
R – Appropriate use of the land
79. The area used to offer good conditions of observation, fields of fire, and covered shelters. Obstacles should enable the movement of enemy forces to areas to initiate counter-attacks or fires of destruction:
R – Appropriate use of the land
80. The defender must take measures not to be surprised, as the enemy retains the initiative of the actions and freedom of maneuver:
R – Security
81. What factors are included in the measure of security?
R – Employment of security forces, seeking knowledge about the location and movement of enemy forces, use of blankets and shelter, camouflage, use of radar and ground surveillance, listening devices, etc.
82. Provides the necessary cohesion to the defense and makes the commitment to destroy the troop split:
R – Mutual support (by fires, observation, and the use of maneuver elements).
83. How to obtain such support?
R – When the nuclei of defense are arranged so that by attacking one of them, the enemy comes under direct fire from at least one other.
84. Why should we make an all-around defense?
R – Because there is freedom of maneuver of attacking in all directions, including transported by air.
85. How important is the need for defense in depth?
R – It is necessary to:
– Reduce the momentum of the attack and prevent the disruption of the defensive.
– Force the enemy to carry out repeated attacks.
– Allow the legal evaluation of the positions carried by the enemy and tell them.
– Prevent the enemy from employing his book time and place not decisive.
– Allow the effects of their fires.
86. How do you get the depth of the defense?
R – Engaging the enemy as soon as possible from the air, with security forces, using weapons of support from the forward positions and at their maximum range of use, employing defensive cores in succession, using barriers arranged in depth, and the operation and proper use of reserves and fire support.
87. How to balance the depth?
R – All-around defense
88. On the defensive, it is achieved by selecting and preparing positions and additional changes, the mobility of the combat elements and the reservation, and the centralized control of weapons of mass support:
R – Flexibility
89. Considering that the offensive is the decisive form of combat, the defender should be sticking to the opportunities that allow them to adopt them. Dynamic actions that lead to taking the initiative include: aggressive patrols, attacks with security forces before the enemy reaches the defensive position (PD), assaults on troops who are preparing to attack, and counter-attacking their penetrations in PD.
90. This law must be considered concurrently with the need to achieve maximum mutual support, maximum security, and minimum vulnerability to enemy fires:
R – Dispersion
91. Prevent fronts from becoming more extensive for the defender, provide more resources to the reserve, prevent lateral movement when an enemy attacks only on the front, facilitate the detection and destruction of evidence, and provide a more appropriate infiltration device to carry out counter-attacks:
R – Dispersion in depth
92. Can lead to the isolation of the points raised, which would be subject to being engaged and hit by parts in the event of an enemy penetration:
R – Wide dispersion
93. The effectiveness of the defense is based on the careful integration and coordination of movement, from planning, fire support, the plan of barriers, and the anti-tank defense plan:
R – Integration and coordination of actions
94. The planning and organization of the defensive position will be much better the longer the time available. Its judicious use should be a constant concern before and during the operation:
R – Time available
ORGANIZATION OF AN AREA OF DEFENSE
95. What are the steps that the defense in depth is organized?
R – Security Area (SEAGA), Forward Defense Area (ADA), and Reserve Area (Ares).
96. Is that extends back and flanks from the previous limit of the Advanced Area Defense (LAAD). In this area, operate the security forces or security level, to provide prompt and timely knowledge about the enemy, preventing its Earth observation about the ADA, deceive you about the PD and, according to his ability, it slows and disorganize it:
R – Security Area
97. Is that extends rearward from the LAAD to the posterior limit of the elements of the first step. It is to be held the decisive actions of the defensive:
R – Forward Defense Area
98. In this area operate advanced defense forces, which will be structured according to the form and tactical defensive adopted. While this is based on maintaining the land, such forces shall be designed to prevent the entry of the attacker in the area. If planning to establish a defense based on mobility, defense forces have advanced the task of channeling the enemy into a region previously chosen to promote its destruction by fire and maneuver to attack the reservation:
R – Forward Defense Area
99. Is that extends from the rear of the elements of the first step to the posterior limit of the category considered:
R – Reserve Area
100. What kind of defense can it be?
R – Area defense and mobile defense
101. It is the form of defensive maneuver where particular attention is the maintenance or control of a given region, denying the attacker access to it?
R – Area defense
102. In area defense, how does the defender hold the enemy in front in the exhibition?
R – Employing a large volume and variety of fireworks. On the other hand, use close combat and counter-attacks to drive out or destroy forces that have made landfall on the PD.
103. In what circumstances do we adopt the defense of the area?
R –
– Requiring the possession of a given area
– The defender has less mobility than the enemy
– Forward to defend rather narrow
– The depth of the ADA is relatively limited
– Terrain restricts the movement of the defender
– Enough time to prepare a defensive position, including the system of barriers
– Is strong enough to provide the appropriate combat power
– The defender does not have freedom of movement in the face of the enemy’s air superiority
– It is not expected that the attacker uses weapons of mass destruction
104. It’s the kind of defense that aims to destroy the enemy by fire and counterattack after drawing him into friendly regions within the DP?
R – Mobile Defense
105. In this type of defense, the maneuver is used in conjunction with the fires and the organization of the land?
R – Mobile Defense
106. The following circumstances indicate the adoption of a mobile defense:
R –
– It is not necessary to maintain a specific area
– The lawyer has mobility equal to or greater than the enemy
– Forward to defend beyond the possibility of establishing an area defense
– The depth of the ADA is appropriate to allow an enemy penetration and a move against him
– It provides good ground handling of the defender
– Time to establish the defense is limited
– Mechanized forces are sufficient to allow rapid concentration of combat power
– The lawyer has air superiority
– The enemy has the capability to employ weapons of mass destruction
107. About the time available for the preparation of the position, it can be classified into two types. What?
R – Prepared defense and immediate defense
108. Occurs when a force is not in contact with the enemy, nor is there any imminent changes occur, there is, therefore, no conditions for planning and implementing comprehensive defensive?
R – Prepared defense
109. Usually includes a well-planned system of barriers, fortification work, and an extensive communications network:
R – Prepared defense
110. Occurs when there is contact or imminent contact with the enemy, providing only limited conditions for installing PD:
R – Immediate defense
111. It is characterized by the worsening of the defensive nature of the ground, launch, and employment barriers summaries of individual houses. You employ principles and techniques of passive defense prepared to be implemented in the current situation?
R – Immediate defense
VARIATION OF AREA DEFENSE
112. In this defense, a squad is positioned to meet attacks from any direction:
R – Circular defense
113. Differs from all-around defense and defense of a front by the tactical value of the land on which it is located and the time, effort, and resources employed in your organization and can only be neutralized by an attacking force mainly of infantry, which has substantial superiority in combat power and after a long time of fighting, should be occupied by combat elements of the minimum value equal to the subunit (especially platoon):
R – Strongpoint defense
114. In this type of defense, the elements of the first step are positioned so that they are covered and sheltered by the ridge topography of the terrain immediately ahead:
R – Reverse slope defense
115. Although it is not occupied by the thick, its control by fire is essential to the success of the defense. If the enemy is established there, the defender must counter-attack to dislodge it:
R – Reverse slope defense
116. This type of defense is a particular advantage for the defender, making up, often a numerical minority. Its value increases with the width, depth, and velocity:
R – Defense of a waterway
117. This type of defense will be designed to deny the enemy possession of accidents that dominate the capital city. The enemy must be hit by fire, as far as possible from urban areas:
R – Defense in a built-up environment
118. What are the steps that the town will be organized, as the defense area?
R – Security Area, Forward Defense Area, and Reserve Area
119. How are defensive positions structured?
R – Around the capital and accident-resistant buildings, prepared along the lines of strengths.
120. A built-up area can be defended to:
– Control transport routes
– Deny the use of ports, airports, and bridges
– Integrate it into the LAAD
– Deny psychological or political advantage to the defender
121. Tactical actions are carried out by a force toward the rear or away from the enemy, under pressure from this or because of an idea of maneuver. In any case, it must be approved by the upper echelon?
R – Retrograde movements
122. What is the general purpose of a retrograde?
R – To preserve the integrity of a force so that it can be used in future offensive actions.
123. What are the types of retrograde movements?
– Delaying action (AçRtrd)
– Withdrawal (Ret)
– Disengagement (Rda)
124. In what types of movements may there be a host in which a unit performing a retrograde movement passes through the lines of another?
R – AçRtrd and Ret
125. Is also retrograde where a force under pressure saves time and gives way, inflicting maximum damage and delaying the enemy without engaging in decisive combat:
R – AçRtrdçRtrd
126 – what are the types of delayed-action?
-delay in a single location;
– Successive positions
– Alternate positions
127 – that was retrograde through which a force engaged, or part of it breaks contact with the enemy.
R – Ret
128 – What types of withdrawal?
R – the enemy under pressure and without pressure from the enemy
129 – it is a retrograde planned and carried out by a force that is not in contact with the enemy, in order to save a power eroded, allowing its use in another location or to avoid a decisive battle.
R – Rda
OTHER OPERATIONS
130 – It is an operation that includes the actions of two friendly ground forces that seek to establish physical contact with each other in a hostile environment.
R – Operation Junction
131 – What’s strength join?
R – is a joint operation between an under stationary and a mobile force.
132 – What are the steps of the join operation?
R – At first, the joint force will be developing an offensive action, while the stationary force will be established in a defensive posture to ensure ownership of an area where there will be the junction itself. In the second stage, the operation may also occur between two forces converged on the move. In this case, one will be designated under the join and the other will act as the stationary.
133 – San purposes of the join operation:
putty-forces (combat power and employment later);
lead-combat elements to support the benefit of troops who are operating in remote locations;
-override position in a single troop or beyond it to continue or start an attack
pressure-relieving and assisting an enemy army that is fighting to break the siege;
-allow two independent forces can lead a pincers movement;
-liaising with forces of infiltration or with elements of guerrilla friends.
134 – What are the purposes of the replacement operation?
To consider the needs dictated by planning, for example, continue the attack in another direction;
and preserve the combat power of a force for later use this in other offensive actions e.
-prepare the force for a replacement operation that requires equipment and / or training of particular character
135 – are types of substitution:
R – replacement in position and overtaking
136 – is the operation that the troops took the device to another (or part thereof) in combat:
R – replacement position
137 – Runs when the element to be replaced is on the defensive, but it may be to replace the troops continue or continue the attack.
R – Replacement Position
138 – Is the operation in which a troop attack by another device that is in position in the line of attack. It takes place on the defensive and the offensive, aiming to maintain the initiative and the thrust of the attack, exploit the enemy’s failure to initiate an attack or a counterattack.
R – Overtaking
139 – What is the selection of the type of place before the attack?
R – replacement in position and overtaking
140 – Includes all measures and / or actions performed in order to ensure normality of the activities developed in the rear, as well as its facilities, transport routes etc..
R – Security in the rear (SEGAR).
140.1 – The covering security in the rear (SEGAR).
R – Defense of the Rear Area (DEFAR) and Damage Control (CD)
141 – Includes a series of actions designed to deceive the enemy about the possibilities, devices and activities of friendly forces, inducing the reaction to it disadvantageous.
R – deception.
142 – How can be obtained from the deceit?
R – carrying alone or the combination of one or more of the following:
Feints, demonstrations, ruses and representations.
143 – it is a shallow attack, with limited purpose, to divert the attention of the enemy’s main attack?
R – dribbling
144 – It’s an exhibition of force on a front where it is not intended decision. Not result in physical contact with the enemy, as in feint.
R – Demonstration
145 – è a pre-planned or improvised, in order to provide the enemy, deliberately, with false knowledge about ongoing operations or in the planning process.
R-Catch
146 – intended to show the enemy troops or means Unavailable or are varied.
R – Representation