Training 2024
OPSEC is a cycle used to identify, analyze, and control ________________ - Answer-critical information
Who should you contact to discuss items on your org's CIIL? - Answer-OPSEC rep/POC
The adversary is collecting info regarding your orgs mission, from the trash and recycling. What is the
adversary exploiting? - Answer-a vulnerability
The loss of sensitive information, even unclassified small bits, can have a direct and negative impact on
ops. - Answer-True
_______________ includes specific facts about friendly intentions, capes, and activities sought by an
adversary t gain a military, diplomatic, etc advantage. - Answer-Critical Information
The adversary CANNOT determine our ops or missions by piecing together small details of info or
indicators. - Answer-False
Periodic _______________ help to evaluate OPSEC effectiveness. - Answer-
Which of the following represents critical information? - Answer-Deployment dates and locations
_______________ are friendly detectable actions and open-source info that can be interpreted or pieced
together by and adversary to derive critical info. - Answer-Indicator
The purpose of OPSEC in the workplace is to ______________. - Answer-reduce vulnerabilities to
friendly mission accomplishment
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your
job and offers to buy you a drink. What should you do? - Answer-Politely decline and change the subject