OPSEC is a five-step process to identify, control and protect critical information and analyze friendly actions and indicators that would allow adversaries or potential adversaries to identify and exploit vulnerabilities
True
Critical Information is ________?
unclassified and controlled unclassified information (CUI)
Which one would be considered critical information?
– Deployment dates and locations
– Military operations
– Acquisitions
– Agency Program of Instructions (POI)
– Position, mission capabilities and limitations
– Training operations and missions
– Schedules and travel itineraries
– Usernames, passwords, network details
– Social security number, credit cards, banking information
Critical unclassified information is sometimes revealed by publicly available information.
True
A threat is an adversary that has the _________ + __________ to take any actions detrimental to the success of DoD activities or operations.
intent + capability
An indicator is a comprehensive analysis of critical information by an advisory normally providing the whole picture if an agency's capabilities.
False
OPSEC is a cycle to identify, analyze, and control ____________ and analyze friendly actions and indicators that would allow adversaries or potential adversaries to identify and exploit vulnerabilities
critical information
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program. True or False?
True
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject
___________ _____________ are planned actions to affect collection, analysis, delivery, or interpretation of information.
OPSEC countermeasures
Who should you contact to discuss items on your organization's critical information and indicator's list (CIIL)?
OPSEC representative such as your organization’s OPSEC Program Managers or signature Manager or Coordinators
The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations. True or False
True
_____________ are friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information
Indicators
_________________ includes specific facts about friendly intentions, capabilities, and activities sought by an adversary to gain a military, diplomatic, economic or technological advantage.
Critical information
An adversary with the _________ and __________ to undertake any actions detrimental to the success of programs, activities, or operations describes OPSEC threat.
capability, intent
The adversary is collecting information regarding you organization's mission, from the trash and recycling. What is the adversary exploiting?
a vulnerability