For military cyber operations, gaining access to operationally useful areas of cyberspace, including targets within them, is affected by legal, policy, or operational limitations.
a) True
b) False