Cards in this guide (22)
OPSEC focuses on what type of critical information
Sensitive but unclassified
What factor takes into account the impact that a compromise would have on your operation
An advantage of integrating opsec principles in your day to day operations ia that it
makes OPSEC principles second nature to your employees
An advantage of incorporating OPSEC principles in the planning stage of any operation is that it
provides for early detection of OPSEC problems
The level of risk is indirectly proportional to all three factors of risk
What if your knowledge of which factors impact your capability to analyze your vulnerabilities
OPSEC is a systematic proven process to identify control and protect classified information about a mission operation or activity and thus denying mitigating adversary's ability to compromise
What are the elements of threat
Patterns, stereotypes, and predictable actions are all types of which of the following
An adversary's capability is defined as his ability to do which of the following
Acquire and exploit critical information
When dealing with countermeasure development what is the bottom line
B. Always weigh the cost of the countermeasure against its
benefit.
Observable and detectable items that can be pieced together through analysis to reveal sensitive information about your operation are called
In OPSEC lack of proper training use of non-secure communications and poor system design are all examples of
Risk is a function of the
D. threat, vulnerability, and impact.
Activities that establish a profile are
indicators that show a unit's daily routines.
What countermeasures should be used sparingly because of its expense and maintenance difficulty
Which of the following statements best describes the risk status if any one element of risk shrinks zero
What are OPSEC Activity tip-offs
They are indicators and vulnerabilities that tell adversaries
where to focus their collection efforts
What is an advantage of using good OPSEC principles during contingencies is that it
Good OPSEC principles are identifying critical information,
analyzing the threat, discovering vulnerabilities, assessing the
risk, and employing the necessary protective measures. By following
these principles you prevent personal information from being
stolen.
When dealing with countermeasure development what is the bottomline
When dealing with countermeasure development, what is the bottomline
What are specific facts about friendly intentions capabilities and operations vitally needed by adversaries to plan and act effectively called
What is the last step in the OPSEC process
Apply OPSEC countermeasures