Training
Which of the following are examples of vulnerabilities exploited by our adversaries to collect our
information? - All the Above
The loss of sensitive information, even unclassified small bits of information, can have a direct and
negative impact on operations. - True
The adversary is collecting information regarding your organizations mission, from the trash and
recycling. What is the adversary exploiting? - a vulnerability
The adversary CANNOT determine our operations or missions by piecing together small details of
information and indicators. - False
Which of the following represents critical information - Deployment dates and locations.
OPSEC is a cycle used to identify, analyze, and control _____ indicating friendly actions associated with
military operations and other activities. - critical information
_____ are friendly detectable actions and open source information that can be interpreted or pieced
together by an adversary to derive critical information. - Indicators.
Who should unit members contact when reporting OPSEC concerns? - All the above
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program -
True
OPSEC is a cycle that involves all of the following EXCEPT - Identify adversary actions to conceal
their information and intentions.