#1
What does OPSEC stand for?
Operational Security
ExplanationIt refers to the process of protecting sensitive information from adversaries.
#2
What is the purpose of a security awareness training program?
To educate employees about security risks and best practices
ExplanationTraining programs enhance employees' understanding of security risks, fostering a culture of vigilance.
#3
Which of the following is a best practice for securing sensitive information?
Regularly updating passwords
ExplanationFrequent password updates reduce the likelihood of unauthorized access, bolstering security.
#4
Which of the following is an example of a physical security measure?
Biometric access control
ExplanationBiometric access control systems restrict physical access, enhancing security by verifying individuals' identities.
#5
What is the purpose of conducting regular security audits?
To identify potential security vulnerabilities
ExplanationSecurity audits help detect weaknesses and gaps in security protocols, enabling proactive measures.
#6
Which of the following is an example of a security incident?
Loss of a company-owned device
ExplanationA lost company device constitutes a security incident as it could lead to unauthorized access to sensitive data.
#7
Which of the following is NOT a component of OPSEC?
Authorization
ExplanationAuthorization is not directly related to OPSEC; it pertains to granting access rights.
#8
What is the primary goal of OPSEC?
To prevent adversaries from obtaining sensitive information
ExplanationOPSEC aims to safeguard critical information by thwarting adversaries' attempts to acquire it.
#9
Which of the following is an example of an OPSEC measure?
Encrypting sensitive data during transmission
ExplanationEncrypting data during transmission adds a layer of protection, ensuring confidentiality.
#10
What is the role of a risk assessment in OPSEC?
To identify vulnerabilities and threats
ExplanationRisk assessments pinpoint weaknesses and potential dangers, aiding in the formulation of protective measures.
#11
What is the purpose of conducting an OPSEC review?
To evaluate the effectiveness of existing OPSEC measures
ExplanationAn OPSEC review assesses the efficiency of current strategies, identifying areas for improvement.
#12
Which of the following is an example of a social engineering attack?
Phishing emails
ExplanationPhishing emails deceive recipients into divulging sensitive information, exploiting human vulnerabilities.
#13
In the context of information protection, what does 'need-to-know' principle imply?
Only individuals with proper clearance should have access to specific information
ExplanationIt limits access to sensitive information to individuals with requisite clearance, reducing risks.