DAF Operations Security Awareness Training

Which of the following represents critical information?

Deployment dates and locations

The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.

True

OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.

True

OPSEC is a cycle that involves all of the following EXCEPT:

Identifying adversary actions to conceal information

________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.

OPSEC countermeasures

The purpose of OPSEC in the workplace is to

reduce vulnerabilities to friendly mission accomplishment.

You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?

Politely decline and change the subject.

The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?

A vulnerability

Periodic ____________ help to evaluate OPSEC effectiveness.

Which of the following represents critical information?

Deployment dates and locations

The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.

True

OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.

True

OPSEC is a cycle that involves all of the following EXCEPT:

Identifying adversary actions to conceal information

________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.

OPSEC countermeasures

The purpose of OPSEC in the workplace is to

reduce vulnerabilities to friendly mission accomplishment.

You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?

Politely decline and change the subject.

The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?

A vulnerability

Periodic ____________ help to evaluate OPSEC effectiveness.

Which of the following are examples of vulnerabilities exploited by our adversaries to collect our information?
All of the above.

An adversary with the ______ and _______ to undertake any actions detrimental to the success of programs, activities, or operations describes an OPSEC threat.

capability, intent

Which of the following represents critical information?

Deployment dates and locations

The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.

True

OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.

True

OPSEC is a cycle that involves all of the following EXCEPT:

Identifying adversary actions to conceal information

________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.

OPSEC countermeasures

The purpose of OPSEC in the workplace is to

reduce vulnerabilities to friendly mission accomplishment.

You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?

Politely decline and change the subject.

The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?

A vulnerability

Periodic ____________ help to evaluate OPSEC effectiveness.

Assessments

You are at a local restaurant with colleagues who are talking about upcoming acquisitions programs and capabilities. You notice the server has been providing extra attention to your table. The server is exploiting the vulnerability of your colleague's work-related discussions and potentially collecting against them.
True

_____ includes specific facts about friendly intentions, capabilities, and activities sought by an adversary to gain a military, diplomatic, economic or technological advantage.
Critical Information

You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?

Politely decline and change the subject.

OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.
True

The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary exploiting?

a vulnerability

______ are friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.
Indicators

Periodic ______ help to evaluate OPSEC effectiveness.
?

Who should unit members contact when reporting OPSEC concerns?
All of the above

The adversary CANNOT determine our operations or missions by piecing together small details of information and indicators.
False

Question: Periodic _____ help to evaluate OPSEC effectiveness.
Answer: Assessments

OPSEC is a cycle used to identify, analyze, and control ________________

critical information

Who should you contact to discuss items on your org's CIIL?

OPSEC rep

The adversary is collecting info regarding your orgs mission, from the trash and recycling. What is the adversary exploiting?

a vulnerability

The loss of sensitive information, even unclassified small bits, can have a direct and negative impact on ops.

True

_______________ includes specific facts about friendly intentions, capes, and activities sought by an adversary t gain a military, diplomatic, etc advantage.

Critical Information

The adversary CANNOT determine our ops or missions by piecing together small details of info or indicators.

False

Periodic _______________ help to evaluate OPSEC effectiveness.

Assessments

Which of the following represents critical information?

Deployment dates and locations

_______________ are friendly detectable actions and open-source info that can be interpreted or pieced together by and adversary to derive critical info.

Indicator

The purpose of OPSEC in the workplace is to ______________.

reduce vulnerabilities to friendly mission accomplishment

You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?

Politely decline and change the subject

OPSEC is a cycle that involves all of the following EXCEPT:

Identifying adversary actions to conceal their info and intentions

Who should unit members contact when reporting OPSEC concerns?

All of the above

You are at a local restaurant with colleagues who are talking about upcoming acquisitions programs and capabilities. The server is sus by listening a lot, is this a vulnerabilities being exploited?

True

______________ _______________ are planned actions to affect collection, analysis, delivery or interpretation of info.

OPSEC countermeasures