#1
What does OPSEC stand for?
Operational Security
ExplanationOPSEC stands for Operational Security, a process of identifying, analyzing, and controlling critical information to protect sensitive activities from potential adversaries.
#2
What is a common OPSEC measure for protecting communication?
Implementing strong encryption
ExplanationA common OPSEC measure for protecting communication is implementing strong encryption to secure sensitive information during transmission.
#3
What is the purpose of conducting OPSEC training for employees?
To increase awareness of security threats
ExplanationThe purpose of conducting OPSEC training for employees is to increase awareness of security threats and ensure they understand and follow security measures.
#4
What role does physical security play in overall OPSEC?
It complements other security measures
ExplanationPhysical security in overall OPSEC plays a complementary role, enhancing protection measures by securing physical access to sensitive areas.
#5
Which of the following is NOT a phase of the OPSEC process?
Incident Response
ExplanationIncident Response is NOT a phase of the OPSEC process; instead, the process includes Identification, Analysis, Risk Assessment, Application of Measures, and Evaluation phases.
#6
Which of the following is NOT a principle of OPSEC?
Subversion
ExplanationSubversion is NOT a principle of OPSEC; the actual principles include Identification of Critical Information, Analysis of Threats, Analysis of Vulnerabilities, Assessment of Risk, and Application of Appropriate Measures.
#7
What is the primary goal of OPSEC?
To maintain operational effectiveness by denying adversaries information
ExplanationThe primary goal of OPSEC is to maintain operational effectiveness by denying adversaries information through the identification and protection of sensitive information.
#8
Which of the following is an example of a physical OPSEC measure?
Locking doors to secure areas
ExplanationLocking doors to secure areas is an example of a physical OPSEC measure, safeguarding access to sensitive locations.
#9
What is the purpose of a risk assessment in OPSEC?
To determine potential vulnerabilities and threats
ExplanationThe purpose of a risk assessment in OPSEC is to identify and evaluate potential vulnerabilities and threats to critical information and operations.
#10
Which of the following is NOT a component of OPSEC planning?
Implementing physical security measures
ExplanationImplementing physical security measures is NOT a component of OPSEC planning; instead, it involves identifying critical information, assessing risks, and applying appropriate measures.
#11
What is the main objective of a threat assessment in OPSEC?
To assess the capabilities of potential adversaries
ExplanationThe main objective of a threat assessment in OPSEC is to assess the capabilities of potential adversaries and understand the risks they pose.
#12
Which of the following is an example of OPSEC violation?
Announcing operational details on social media
ExplanationAnnouncing operational details on social media is an example of an OPSEC violation, as it exposes sensitive information to potential adversaries.
#13
Which entity typically oversees OPSEC compliance within an organization?
Security department
ExplanationThe security department typically oversees OPSEC compliance within an organization, ensuring that security measures are implemented and followed.
#14
What is the 'golden rule' of OPSEC?
Always assume the enemy knows
ExplanationThe 'golden rule' of OPSEC is to always assume the enemy knows, emphasizing the need for constant vigilance and protection of critical information.
#15
What is the role of social engineering in OPSEC?
To exploit human vulnerabilities
ExplanationThe role of social engineering in OPSEC is to exploit human vulnerabilities, manipulating individuals to disclose sensitive information.
#16
What is the significance of OPSEC in the context of social media use?
It helps prevent inadvertent disclosure of sensitive information
ExplanationOPSEC in the context of social media use is significant as it helps prevent inadvertent disclosure of sensitive information, safeguarding against potential threats.
#17
Which of the following is an example of an insider threat to OPSEC?
Unintentional data leaks by employees
ExplanationUnintentional data leaks by employees are examples of insider threats to OPSEC, highlighting the risk of internal personnel compromising sensitive information.