DAF Operations Security Awareness Training
Which of the following represents critical information?
Deployment dates and locations
The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.
True
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.
True
OPSEC is a cycle that involves all of the following EXCEPT:
Identifying adversary actions to conceal information
________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.
OPSEC countermeasures
The purpose of OPSEC in the workplace is to
reduce vulnerabilities to friendly mission accomplishment.
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject.
The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?
A vulnerability
Periodic ____________ help to evaluate OPSEC effectiveness.
Which of the following represents critical information?
Deployment dates and locations
The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.
True
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.
True
OPSEC is a cycle that involves all of the following EXCEPT:
Identifying adversary actions to conceal information
________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.
OPSEC countermeasures
The purpose of OPSEC in the workplace is to
reduce vulnerabilities to friendly mission accomplishment.
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject.
The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?
A vulnerability
Periodic ____________ help to evaluate OPSEC effectiveness.
Which of the following are examples of vulnerabilities exploited by our adversaries to collect our information?
All of the above.
An adversary with the ______ and _______ to undertake any actions detrimental to the success of programs, activities, or operations describes an OPSEC threat.
capability, intent
Which of the following represents critical information?
Deployment dates and locations
The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.
True
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.
True
OPSEC is a cycle that involves all of the following EXCEPT:
Identifying adversary actions to conceal information
________________ are planned actions to affect collection, analysis, delivery, or interpretation of information.
OPSEC countermeasures
The purpose of OPSEC in the workplace is to
reduce vulnerabilities to friendly mission accomplishment.
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject.
The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary explointing?
A vulnerability
Periodic ____________ help to evaluate OPSEC effectiveness.
Assessments
You are at a local restaurant with colleagues who are talking about upcoming acquisitions programs and capabilities. You notice the server has been providing extra attention to your table. The server is exploiting the vulnerability of your colleague's work-related discussions and potentially collecting against them.
True
_____ includes specific facts about friendly intentions, capabilities, and activities sought by an adversary to gain a military, diplomatic, economic or technological advantage.
Critical Information
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject.
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program.
True
The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary exploiting?
a vulnerability
______ are friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.
Indicators
Periodic ______ help to evaluate OPSEC effectiveness.
?
Who should unit members contact when reporting OPSEC concerns?
All of the above
The adversary CANNOT determine our operations or missions by piecing together small details of information and indicators.
False
Question: Periodic _____ help to evaluate OPSEC effectiveness.
Answer: Assessments
OPSEC is a cycle used to identify, analyze, and control ________________
critical information
Who should you contact to discuss items on your org's CIIL?
OPSEC rep
The adversary is collecting info regarding your orgs mission, from the trash and recycling. What is the adversary exploiting?
a vulnerability
The loss of sensitive information, even unclassified small bits, can have a direct and negative impact on ops.
True
_______________ includes specific facts about friendly intentions, capes, and activities sought by an adversary t gain a military, diplomatic, etc advantage.
Critical Information
The adversary CANNOT determine our ops or missions by piecing together small details of info or indicators.
False
Periodic _______________ help to evaluate OPSEC effectiveness.
Assessments
Which of the following represents critical information?
Deployment dates and locations
_______________ are friendly detectable actions and open-source info that can be interpreted or pieced together by and adversary to derive critical info.
Indicator
The purpose of OPSEC in the workplace is to ______________.
reduce vulnerabilities to friendly mission accomplishment
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject
OPSEC is a cycle that involves all of the following EXCEPT:
Identifying adversary actions to conceal their info and intentions
Who should unit members contact when reporting OPSEC concerns?
All of the above
You are at a local restaurant with colleagues who are talking about upcoming acquisitions programs and capabilities. The server is sus by listening a lot, is this a vulnerabilities being exploited?
True
______________ _______________ are planned actions to affect collection, analysis, delivery or interpretation of info.
OPSEC countermeasures