30 Questions
What is the first step in OPSEC assessment?
Determine critical information
How can OPSEC be described?
A proactive process
What is the purpose of consistently employing counter measures in OPSEC?
To deter adversaries
Why is it important to assess and rate critical information in OPSEC?
To determine vulnerable assets
What does OPSEC complement?
Traditional security measures
What viewpoint is emphasized in the concept of OPSEC?
Adversary's viewpoint
What is the main point of the text?
It is dangerous to assume safety and not take responsibility for it.
Why is it important to review information before posting on websites?
To avoid disclosing sensitive or critical information.
What is the importance of password protecting information placed on shared drives?
To apply the 'Need to Know' principle and restrict access.
Why should one review a press release before sharing it?
To check that no critical information is unintentionally disclosed.
What does the text recommend regarding the disposal of sensitive information?
Ensuring only unclassified information goes into trash/recycle bins.
Why is it important to encrypt e-mails when sending sensitive information?
To prevent unauthorized access to the content of the email.
What is the primary purpose of surreptitious entry?
To obtain useful information from a target without consent
How is surreptitious entry different from other methods of entry?
It leaves behind noticeable forensic evidence
What type of activities can surreptitious entry be employed in?
Gaining access without the consent of the custodian
Why is surreptitious entry described as clandestine?
Because it must be discreet and unnoticeable
What distinguishes surreptitious entry from other methods in terms of leaving evidence?
Leaves no forensic evidence behind
In surreptitious entry, what type of materials can be collected apart from information?
Dangerous chemicals and machines
What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?
Cam locks
Which type of lever turns instead of applying pressure to the lock when forced?
Clutch levers
Where are rim cylinder locks generally used?
Commercial doors
What feature allows cam locks to interface with another locking mechanism?
Tailpieces
How are rim cylinder locks held in place?
Two screws from the inside
In which direction can cam locks rotate, and how much can their rotation be limited to?
Clockwise or counter-clockwise, limited to 90 or 180 degrees
What is the purpose of Positive Vetting?
To carry out a very detailed enquiry on individuals or companies
Why is it important to include immediate family members in Positive Vetting?
They have a significant influence on the individual's decisions
Which type of Vetting involves a thorough investigation of an individual's financial background?
Positive Vetting
What is the main difference between Routine Vetting and Positive Vetting?
Routine Vetting involves detailed enquiries, while Positive Vetting is simple
Which type of Vetting includes a discreet check of records to meet legal requirements?
Routine Vetting
Why is Continuous Vetting important in security measures?
To continuously reassess an individual's trustworthiness and loyalty
Test your knowledge on security operative measures and surreptitious entry, which involves gaining unauthorized access without detection. Learn about safeguarding operations and deterring threats in daily activities.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free