Security Operative Measures and Surreptitious Entry Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step in OPSEC assessment?

  • Make a list of adversaries
  • Employ counter measures
  • Determine critical information (correct)
  • Assess ways to compromise information

How can OPSEC be described?

  • An offensive strategy
  • A reactive process
  • A defensive strategy
  • A proactive process (correct)

What is the purpose of consistently employing counter measures in OPSEC?

  • To provoke adversaries
  • To gather information about adversaries
  • To confuse adversaries
  • To deter adversaries (correct)

Why is it important to assess and rate critical information in OPSEC?

<p>To determine vulnerable assets (B)</p> Signup and view all the answers

What does OPSEC complement?

<p>Traditional security measures (A)</p> Signup and view all the answers

What viewpoint is emphasized in the concept of OPSEC?

<p>Adversary's viewpoint (A)</p> Signup and view all the answers

What is the main point of the text?

<p>It is dangerous to assume safety and not take responsibility for it. (A)</p> Signup and view all the answers

Why is it important to review information before posting on websites?

<p>To avoid disclosing sensitive or critical information. (C)</p> Signup and view all the answers

What is the importance of password protecting information placed on shared drives?

<p>To apply the 'Need to Know' principle and restrict access. (A)</p> Signup and view all the answers

Why should one review a press release before sharing it?

<p>To check that no critical information is unintentionally disclosed. (B)</p> Signup and view all the answers

What does the text recommend regarding the disposal of sensitive information?

<p>Ensuring only unclassified information goes into trash/recycle bins. (A)</p> Signup and view all the answers

Why is it important to encrypt e-mails when sending sensitive information?

<p>To prevent unauthorized access to the content of the email. (D)</p> Signup and view all the answers

What is the primary purpose of surreptitious entry?

<p>To obtain useful information from a target without consent (C)</p> Signup and view all the answers

How is surreptitious entry different from other methods of entry?

<p>It leaves behind noticeable forensic evidence (C)</p> Signup and view all the answers

What type of activities can surreptitious entry be employed in?

<p>Gaining access without the consent of the custodian (C)</p> Signup and view all the answers

Why is surreptitious entry described as clandestine?

<p>Because it must be discreet and unnoticeable (C)</p> Signup and view all the answers

What distinguishes surreptitious entry from other methods in terms of leaving evidence?

<p>Leaves no forensic evidence behind (D)</p> Signup and view all the answers

In surreptitious entry, what type of materials can be collected apart from information?

<p>Dangerous chemicals and machines (B)</p> Signup and view all the answers

What type of locks are frequently found in filing cabinets, mailboxes, and lower security OEM applications?

<p>Cam locks (B)</p> Signup and view all the answers

Which type of lever turns instead of applying pressure to the lock when forced?

<p>Clutch levers (A)</p> Signup and view all the answers

Where are rim cylinder locks generally used?

<p>Commercial doors (A)</p> Signup and view all the answers

What feature allows cam locks to interface with another locking mechanism?

<p>Tailpieces (B)</p> Signup and view all the answers

How are rim cylinder locks held in place?

<p>Two screws from the inside (C)</p> Signup and view all the answers

In which direction can cam locks rotate, and how much can their rotation be limited to?

<p>Clockwise or counter-clockwise, limited to 90 or 180 degrees (A)</p> Signup and view all the answers

What is the purpose of Positive Vetting?

<p>To carry out a very detailed enquiry on individuals or companies (D)</p> Signup and view all the answers

Why is it important to include immediate family members in Positive Vetting?

<p>They have a significant influence on the individual's decisions (C)</p> Signup and view all the answers

Which type of Vetting involves a thorough investigation of an individual's financial background?

<p>Positive Vetting (B)</p> Signup and view all the answers

What is the main difference between Routine Vetting and Positive Vetting?

<p>Routine Vetting involves detailed enquiries, while Positive Vetting is simple (A)</p> Signup and view all the answers

Which type of Vetting includes a discreet check of records to meet legal requirements?

<p>Routine Vetting (C)</p> Signup and view all the answers

Why is Continuous Vetting important in security measures?

<p>To continuously reassess an individual's trustworthiness and loyalty (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser