D430 - Section 4 -
Knowledge Checks
and Practice Quiz(33
questions and
answers)
KC: Which term refers to the process of gathering
and analyzing information to support business
decisions?
Competitive Intelligence
3 multiple choice options
KC: Which term refers to a security and risk
management process that prevents sensitive
information from getting into the wrong hands?
Operational Security
3 multiple choice options
KC: Which of the following is defined as the
practice of managing the range of intelligence-
gathering activities directed at an organization?
Competitive Counterintelligence
3 multiple choice options
, KC: What is the codename for a study conducted to
curtail unauthorized passing of information and is
the symbol of OPSEC today?
Purple Dragon
3 multiple choice options
KC: What is the correct order in the 5 steps of the
Operations Security Process ?
1) Identification of critical information;
2) Analysis of threats;
3) Analysis of vulnerabilities;
4) Assessment of risks;
5) Application of countermeasures.
3 multiple choice options
KC: What describes Vulnerability analysis?
The identification of weaknesses that can be used
to cause harm.
3 multiple choice options
KC: What is the weakest link in a security program?
People
3 multiple choice options
KC: Which type of attack is conducted on people to
gather information?
Social Engineering
3 multiple choice options
Knowledge Checks
and Practice Quiz(33
questions and
answers)
KC: Which term refers to the process of gathering
and analyzing information to support business
decisions?
Competitive Intelligence
3 multiple choice options
KC: Which term refers to a security and risk
management process that prevents sensitive
information from getting into the wrong hands?
Operational Security
3 multiple choice options
KC: Which of the following is defined as the
practice of managing the range of intelligence-
gathering activities directed at an organization?
Competitive Counterintelligence
3 multiple choice options
, KC: What is the codename for a study conducted to
curtail unauthorized passing of information and is
the symbol of OPSEC today?
Purple Dragon
3 multiple choice options
KC: What is the correct order in the 5 steps of the
Operations Security Process ?
1) Identification of critical information;
2) Analysis of threats;
3) Analysis of vulnerabilities;
4) Assessment of risks;
5) Application of countermeasures.
3 multiple choice options
KC: What describes Vulnerability analysis?
The identification of weaknesses that can be used
to cause harm.
3 multiple choice options
KC: What is the weakest link in a security program?
People
3 multiple choice options
KC: Which type of attack is conducted on people to
gather information?
Social Engineering
3 multiple choice options