OPSEC Security Training Course Exam
All of the above - ANSWER-Which of the following are examples of vulnerabilities
exploited by our adversaries to collect our information?
Assessments - ANSWER-Periodic _______ help to evaluate OPSEC effectiveness.
capability, intent - ANSWER-An adversary with the _______ and ________ to
undertake any actions detrimental to the success of programs, activities, or operations
describes an OPSEC threat.
Critical information - ANSWER-includes specific facts about friendly intentions,
capabilities, and activities sought by an adversary to gain a military, diplomatic,
economic or technological advantage.
False - ANSWER-The adversary CANNOT determine our operations or missions by
piecing together small details of information and indicators.
incorporating a periodic assessment to evaluate effectiveness-not - ANSWER-OPSEC
is a cycle that involves all of the following except
Politely decline and change the subject - ANSWER-You are out with friends at a local
establishment. A stranger walks up to you and starts to ask about your job and offers to
buy you a drink. What should you do?
True - ANSWER-The loss of sensitive information, even unclassified small bits of
information, can have a direct and negative impact on operations.
True - ANSWER-You are at a local restaurant with colleagues who are talking about
upcoming acquisitions programs and capabilities. you notice the server has been
providing extra attention to your table. The server is exploiting the vulnerability of your
colleague's work-related discussions and potentially collecting against them.
Vulnerabilities-not - ANSWER-are friendly detectable actions and open-source
information that can be interpreted or pieced together by an adversary to derive critical
information
All of the above - ANSWER-Which of the following are examples of vulnerabilities
exploited by our adversaries to collect our information?
Assessments - ANSWER-Periodic _______ help to evaluate OPSEC effectiveness.
capability, intent - ANSWER-An adversary with the _______ and ________ to
undertake any actions detrimental to the success of programs, activities, or operations
describes an OPSEC threat.
Critical information - ANSWER-includes specific facts about friendly intentions,
capabilities, and activities sought by an adversary to gain a military, diplomatic,
economic or technological advantage.
False - ANSWER-The adversary CANNOT determine our operations or missions by
piecing together small details of information and indicators.
incorporating a periodic assessment to evaluate effectiveness-not - ANSWER-OPSEC
is a cycle that involves all of the following except
Politely decline and change the subject - ANSWER-You are out with friends at a local
establishment. A stranger walks up to you and starts to ask about your job and offers to
buy you a drink. What should you do?
True - ANSWER-The loss of sensitive information, even unclassified small bits of
information, can have a direct and negative impact on operations.
True - ANSWER-You are at a local restaurant with colleagues who are talking about
upcoming acquisitions programs and capabilities. you notice the server has been
providing extra attention to your table. The server is exploiting the vulnerability of your
colleague's work-related discussions and potentially collecting against them.
Vulnerabilities-not - ANSWER-are friendly detectable actions and open-source
information that can be interpreted or pieced together by an adversary to derive critical
information