Security Operative Measures and Surreptitious Entry Quiz

IllustriousEpilogue9940 avatar
IllustriousEpilogue9940
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the first step in OPSEC assessment?

Determine critical information

How can OPSEC be described?

A proactive process

What is the purpose of consistently employing counter measures in OPSEC?

To deter adversaries

Why is it important to assess and rate critical information in OPSEC?

To determine vulnerable assets

What does OPSEC complement?

Traditional security measures

What viewpoint is emphasized in the concept of OPSEC?

Adversary's viewpoint

What is the main point of the text?

It is dangerous to assume safety and not take responsibility for it.

Why is it important to review information before posting on websites?

To avoid disclosing sensitive or critical information.

What is the importance of password protecting information placed on shared drives?

To apply the 'Need to Know' principle and restrict access.

Why should one review a press release before sharing it?

To check that no critical information is unintentionally disclosed.

What does the text recommend regarding the disposal of sensitive information?

Ensuring only unclassified information goes into trash/recycle bins.

Why is it important to encrypt e-mails when sending sensitive information?

To prevent unauthorized access to the content of the email.

What is the primary purpose of surreptitious entry?

To obtain useful information from a target without consent

How is surreptitious entry different from other methods of entry?

It leaves behind noticeable forensic evidence

What type of activities can surreptitious entry be employed in?

Gaining access without the consent of the custodian

Why is surreptitious entry described as clandestine?

Because it must be discreet and unnoticeable

What distinguishes surreptitious entry from other methods in terms of leaving evidence?

Leaves no forensic evidence behind

In surreptitious entry, what type of materials can be collected apart from information?

Dangerous chemicals and machines

What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?

Cam locks

Which type of lever turns instead of applying pressure to the lock when forced?

Clutch levers

Where are rim cylinder locks generally used?

Commercial doors

What feature allows cam locks to interface with another locking mechanism?

Tailpieces

How are rim cylinder locks held in place?

Two screws from the inside

In which direction can cam locks rotate, and how much can their rotation be limited to?

Clockwise or counter-clockwise, limited to 90 or 180 degrees

What is the purpose of Positive Vetting?

To carry out a very detailed enquiry on individuals or companies

Why is it important to include immediate family members in Positive Vetting?

They have a significant influence on the individual's decisions

Which type of Vetting involves a thorough investigation of an individual's financial background?

Positive Vetting

What is the main difference between Routine Vetting and Positive Vetting?

Routine Vetting involves detailed enquiries, while Positive Vetting is simple

Which type of Vetting includes a discreet check of records to meet legal requirements?

Routine Vetting

Why is Continuous Vetting important in security measures?

To continuously reassess an individual's trustworthiness and loyalty

Test your knowledge on security operative measures and surreptitious entry, which involves gaining unauthorized access without detection. Learn about safeguarding operations and deterring threats in daily activities.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser