Training
______________ _______________ are planned actions to affect collection, evaluation,
transport or interpretation of information. - ANS-OPSEC countermeasures
_______________ are pleasant detectable moves and open-source information that may be
interpreted or pieced together by and adversary to derive essential info. - ANS-Indicator
_______________ consists of particular records about friendly intentions, capes, and sports
sought by an adversary t advantage a navy, diplomatic, etc advantage. - ANS-Critical
Information
OPSEC is a cycle that involves all the following EXCEPT: - ANS-Identifying adversary moves
to hide their information and intentions
OPSEC is a cycle used to become aware of, examine, and manage ________________ -
ANS-critical information
Periodic _______________ help to evaluate OPSEC effectiveness. - ANS-
The adversary CANNOT decide our ops or missions by means of piecing together small
details of info or indicators. - ANS-False
The adversary is amassing info concerning your orgs assignment, from the trash and
recycling. What is the adversary exploiting? - ANS-a vulnerability
The loss of touchy information, even unclassified small bits, may have an immediate and
bad effect on ops. - ANS-True
The cause of OPSEC in the place of business is to ______________. - ANS-lessen
vulnerabilities to pleasant task accomplishment
Which of the subsequent represents vital data? - ANS-Deployment dates and places
Who should unit contributors contact while reporting OPSEC worries? - ANS-All of the above
Who should you contact to speak about items on your org's CIIL? - ANS-OPSEC rep/POC
You are at a local eating place with colleagues who are speakme approximately upcoming
acquisitions programs and skills. The server is sus by means of listening lots, is that this a
vulnerabilities being exploited? - ANS-True