Security Operative Measures and Surreptitious Entry Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step in OPSEC assessment?

  • Make a list of adversaries
  • Employ counter measures
  • Determine critical information (correct)
  • Assess ways to compromise information
  • How can OPSEC be described?

  • An offensive strategy
  • A reactive process
  • A defensive strategy
  • A proactive process (correct)
  • What is the purpose of consistently employing counter measures in OPSEC?

  • To provoke adversaries
  • To gather information about adversaries
  • To confuse adversaries
  • To deter adversaries (correct)
  • Why is it important to assess and rate critical information in OPSEC?

    <p>To determine vulnerable assets</p> Signup and view all the answers

    What does OPSEC complement?

    <p>Traditional security measures</p> Signup and view all the answers

    What viewpoint is emphasized in the concept of OPSEC?

    <p>Adversary's viewpoint</p> Signup and view all the answers

    What is the main point of the text?

    <p>It is dangerous to assume safety and not take responsibility for it.</p> Signup and view all the answers

    Why is it important to review information before posting on websites?

    <p>To avoid disclosing sensitive or critical information.</p> Signup and view all the answers

    What is the importance of password protecting information placed on shared drives?

    <p>To apply the 'Need to Know' principle and restrict access.</p> Signup and view all the answers

    Why should one review a press release before sharing it?

    <p>To check that no critical information is unintentionally disclosed.</p> Signup and view all the answers

    What does the text recommend regarding the disposal of sensitive information?

    <p>Ensuring only unclassified information goes into trash/recycle bins.</p> Signup and view all the answers

    Why is it important to encrypt e-mails when sending sensitive information?

    <p>To prevent unauthorized access to the content of the email.</p> Signup and view all the answers

    What is the primary purpose of surreptitious entry?

    <p>To obtain useful information from a target without consent</p> Signup and view all the answers

    How is surreptitious entry different from other methods of entry?

    <p>It leaves behind noticeable forensic evidence</p> Signup and view all the answers

    What type of activities can surreptitious entry be employed in?

    <p>Gaining access without the consent of the custodian</p> Signup and view all the answers

    Why is surreptitious entry described as clandestine?

    <p>Because it must be discreet and unnoticeable</p> Signup and view all the answers

    What distinguishes surreptitious entry from other methods in terms of leaving evidence?

    <p>Leaves no forensic evidence behind</p> Signup and view all the answers

    In surreptitious entry, what type of materials can be collected apart from information?

    <p>Dangerous chemicals and machines</p> Signup and view all the answers

    What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?

    <p>Cam locks</p> Signup and view all the answers

    Which type of lever turns instead of applying pressure to the lock when forced?

    <p>Clutch levers</p> Signup and view all the answers

    Where are rim cylinder locks generally used?

    <p>Commercial doors</p> Signup and view all the answers

    What feature allows cam locks to interface with another locking mechanism?

    <p>Tailpieces</p> Signup and view all the answers

    How are rim cylinder locks held in place?

    <p>Two screws from the inside</p> Signup and view all the answers

    In which direction can cam locks rotate, and how much can their rotation be limited to?

    <p>Clockwise or counter-clockwise, limited to 90 or 180 degrees</p> Signup and view all the answers

    What is the purpose of Positive Vetting?

    <p>To carry out a very detailed enquiry on individuals or companies</p> Signup and view all the answers

    Why is it important to include immediate family members in Positive Vetting?

    <p>They have a significant influence on the individual's decisions</p> Signup and view all the answers

    Which type of Vetting involves a thorough investigation of an individual's financial background?

    <p>Positive Vetting</p> Signup and view all the answers

    What is the main difference between Routine Vetting and Positive Vetting?

    <p>Routine Vetting involves detailed enquiries, while Positive Vetting is simple</p> Signup and view all the answers

    Which type of Vetting includes a discreet check of records to meet legal requirements?

    <p>Routine Vetting</p> Signup and view all the answers

    Why is Continuous Vetting important in security measures?

    <p>To continuously reassess an individual's trustworthiness and loyalty</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser