Exam Questions And Answers Verified 100%
Correct
OPSEC countermeasures can be used to:
-Assist in the identification of OPSEC vulnerabilities.
-Prevent the adversary from exploiting a vulnerability.
-Assist in the development of daily support to secure all unclassified information.
-Prevent the adversary from detecting an indicator and from exploiting a vulnerability. -
Prevent the adversary from detecting an indicator. - ANSWER Prevent the adversary
from detecting an indicator and from exploiting a vulnerability.
OPSEC is:
-A program designed to ensure the safety of all information.
-A process that is a systematic method used to identify, control, and protect critical
information.
-All answers are correct.
-A set of tactics, techniques and procedures requiring daily implementation. - ANSWER
~All answers are correct.
The identification of critical information is a key part of the OPSEC process because:
-It focuses the OPSEC process on protecting all unclassified information.
-None of the answers are correct.
-It is required by the JTF commander to formulate operational COAs in the planning
process.
-It is the fifth and final step of the OPSEC process.
-It focuses the remainder of the OPSEC process on protecting vital information rather
than attempting to protect all unclassified information. - ANSWER ~It focuses the
remainder of the OPSEC process on protecting vital information rather than attempting
to protect all unclassified information.
After initial OPSEC training upon arrival to the command all personnel are required to: -
Accomplish OPSEC annual refresher training and inform their OPSEC representative
that training has been accomplish, therefore no further OPSEC training is required until
the following year.
-Inform the EUCOM J2 Security Office of Initial OPSEC training completion.
-Accomplish OPSEC annual refresher training.
-Inform their OPSEC representative that initial OPSEC training has been accomplished
and therefore no further OPSEC training is required until the following calendar year. -
Enter the date of initial OPSEC training completion into the JTIMS system. - ANSWER
Accomplish OPSEC annual refresher training.
, OPSEC planning should focus on:
-Identifying adversary order of battle information.
-Routine daily activities that only include classified information.
-Routine daily activities to include all unclassified information.
-None of the answers apply.
-Identifying and protecting critical information. - ANSWER Identifying and protecting
critical information.
What is the CIL?
-The Consolidated Intelligence Listing.
-None of the answers are correct.
-The Center for Information at Langley.
-The Classification of Intelligence List.
-The Critical Information List. - ANSWER The Critical Information List.
A vulnerability exists when:
-The adversary is capable of collecting critical information, correctly analyzing it, and
then taking timely action.
-Friendly forces detect a weakness in their operations and when the adversary is
capable of collecting critical information, correctly analyzing it, and then taking timely
action.
-The adversary is able to collect friendly critical information.
-Friendly forces detect a weakness in their operations.
-The adversary is capable of detecting critical information. - ANSWER The adversary is
capable of collecting critical information, correctly analyzing it, and then taking timely
action.
Understanding that protection of sensitive unclassified information is:
-The responsibility of Military members.
-The responsibility of only the OPSEC Program Managers.
-The responsibility of Military and Government Civilians.
-The responsibility of all persons, including civilians and contractors The responsibility of
Contractors - ANSWER The responsibility of all persons, including civilians and
contractors The responsibility of Contractors
OPSEC is:
-None of the answers are correct.
-A security function not an operations function.
-All of the answers are correct.
-An operations function, not a security function.
-A COMSEC function and not a security function. - ANSWER An operations function,
not a security function.