(OPSEC); Questions & Answers
OPSEC is a cycle used to identify, analyze, and control _____ indicating friendly
actions associated with military operations and other activities. Answer-
critical information
_____ are friendly detectable actions and open source information that can be
interpreted or pieced together by an adversary to derive critical information.
Answer-Indicators.
Which of the following are examples of vulnerabilities exploited by our
adversaries to collect our information? Answer-All the Above
The loss of sensitive information, even unclassified small bits of information, can
have a direct and negative impact on operations. Answer-True
The adversary is collecting information regarding your organizations mission,
from the trash and recycling. What is the adversary exploiting? Answer-a
vulnerability
The adversary CANNOT determine our operations or missions by piecing
together small details of information and indicators. Answer-False