The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary exploiting? - correct answer The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations. - correct answer True
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program. - correct answer True
____________ includes specific facts about friendly intentions, capabilities, and activities sought by an adversary to gain a military, diplomatic, economic or technological advantage. - correct answer Critical information
You are at a local restaurant with colleagues who are talking about upcoming acquisitions programs and capabilities. You notice the server has been providing extra attention to your table. The server is exploiting the vulnerability of your colleague's work-related discussions and potentially collecting against
them. - correct answer True
Which of the following are examples of vulnerabilities exploited by our adversaries to collect our information? - correct answer All of the above
___________ are friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information. - correct answer Indicators
OPSEC is a cycle used to identify, analyze and control ___________ indicating friendly actions associated with military operations and other activities. - correct answer critical information
The adversary CANNOT determine our operations or missions by piecing together small details of information and indicators. - correct answer False