Podcast
Questions and Answers
What is the first step in OPSEC assessment?
What is the first step in OPSEC assessment?
- Make a list of adversaries
- Employ counter measures
- Determine critical information (correct)
- Assess ways to compromise information
How can OPSEC be described?
How can OPSEC be described?
- An offensive strategy
- A reactive process
- A defensive strategy
- A proactive process (correct)
What is the purpose of consistently employing counter measures in OPSEC?
What is the purpose of consistently employing counter measures in OPSEC?
- To provoke adversaries
- To gather information about adversaries
- To confuse adversaries
- To deter adversaries (correct)
Why is it important to assess and rate critical information in OPSEC?
Why is it important to assess and rate critical information in OPSEC?
What does OPSEC complement?
What does OPSEC complement?
What viewpoint is emphasized in the concept of OPSEC?
What viewpoint is emphasized in the concept of OPSEC?
What is the main point of the text?
What is the main point of the text?
Why is it important to review information before posting on websites?
Why is it important to review information before posting on websites?
What is the importance of password protecting information placed on shared drives?
What is the importance of password protecting information placed on shared drives?
Why should one review a press release before sharing it?
Why should one review a press release before sharing it?
What does the text recommend regarding the disposal of sensitive information?
What does the text recommend regarding the disposal of sensitive information?
Why is it important to encrypt e-mails when sending sensitive information?
Why is it important to encrypt e-mails when sending sensitive information?
What is the primary purpose of surreptitious entry?
What is the primary purpose of surreptitious entry?
How is surreptitious entry different from other methods of entry?
How is surreptitious entry different from other methods of entry?
What type of activities can surreptitious entry be employed in?
What type of activities can surreptitious entry be employed in?
Why is surreptitious entry described as clandestine?
Why is surreptitious entry described as clandestine?
What distinguishes surreptitious entry from other methods in terms of leaving evidence?
What distinguishes surreptitious entry from other methods in terms of leaving evidence?
In surreptitious entry, what type of materials can be collected apart from information?
In surreptitious entry, what type of materials can be collected apart from information?
What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?
What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?
Which type of lever turns instead of applying pressure to the lock when forced?
Which type of lever turns instead of applying pressure to the lock when forced?
Where are rim cylinder locks generally used?
Where are rim cylinder locks generally used?
What feature allows cam locks to interface with another locking mechanism?
What feature allows cam locks to interface with another locking mechanism?
How are rim cylinder locks held in place?
How are rim cylinder locks held in place?
In which direction can cam locks rotate, and how much can their rotation be limited to?
In which direction can cam locks rotate, and how much can their rotation be limited to?
What is the purpose of Positive Vetting?
What is the purpose of Positive Vetting?
Why is it important to include immediate family members in Positive Vetting?
Why is it important to include immediate family members in Positive Vetting?
Which type of Vetting involves a thorough investigation of an individual's financial background?
Which type of Vetting involves a thorough investigation of an individual's financial background?
What is the main difference between Routine Vetting and Positive Vetting?
What is the main difference between Routine Vetting and Positive Vetting?
Which type of Vetting includes a discreet check of records to meet legal requirements?
Which type of Vetting includes a discreet check of records to meet legal requirements?
Why is Continuous Vetting important in security measures?
Why is Continuous Vetting important in security measures?
Flashcards are hidden until you start studying