Joint Staff Operations Security (OPSEC)
Work related information posted to social networking sites or discussed in public may create
___________ that can be exploited by the adversary.
-Threats
-Indicators
-Vulnerabilities
-Risk - ANSWERS-Vulnerabilities
Which is not an example of an OPSEC countermeasure?
-Make indicators seem unimportant.
-Minimize predictable patterns.
-Protecting critical information.
-Sudden change to a predictable routine. - ANSWERS-Sudden change to a predictable routine.
Match the five-step OPSEC process with the action associated with the step. - ANSWERS-B
-A
-E
-D
-C
What is OPSEC?
-Part of everyone's job - including yours.
-Only applies to work and is not applicable to my personal life.
-A process, not a set of rules.
Work related information posted to social networking sites or discussed in public may create
___________ that can be exploited by the adversary.
-Threats
-Indicators
-Vulnerabilities
-Risk - ANSWERS-Vulnerabilities
Which is not an example of an OPSEC countermeasure?
-Make indicators seem unimportant.
-Minimize predictable patterns.
-Protecting critical information.
-Sudden change to a predictable routine. - ANSWERS-Sudden change to a predictable routine.
Match the five-step OPSEC process with the action associated with the step. - ANSWERS-B
-A
-E
-D
-C
What is OPSEC?
-Part of everyone's job - including yours.
-Only applies to work and is not applicable to my personal life.
-A process, not a set of rules.