#1
What does OPSEC stand for?
Operational Security
ExplanationProtecting sensitive information related to operations.
#2
What is the primary goal of OPSEC?
To deny adversaries information that could harm the mission
ExplanationPreventing adversaries from gaining harmful information.
#3
Why is it important to periodically review and update OPSEC plans?
To ensure they remain relevant and effective against evolving threats
ExplanationAdapting to changing security landscapes.
#4
What is the significance of conducting OPSEC training for employees?
To ensure employees understand their roles in protecting sensitive information
ExplanationEducating personnel for effective security practices.
#5
What is the purpose of conducting an OPSEC review before a public event?
To identify and mitigate potential vulnerabilities
ExplanationEnsuring security during public engagements.
#6
Which of the following is NOT considered sensitive information in terms of OPSEC?
Publicly available product information
ExplanationInformation available to the public is not sensitive.
#7
Which of the following is an example of an OPSEC measure?
Encrypting emails for internal communication
ExplanationSecuring communication to prevent interception.
#8
What is the concept of 'need-to-know' principle in OPSEC?
Only those who need certain information should have access to it
ExplanationLimiting access to information to authorized personnel.
#9
Which of the following is NOT a step in the OPSEC process?
Encrypt all communication
ExplanationEncryption is a measure but not a step in the process.
#10
What is the role of social engineering in OPSEC?
To manipulate individuals into revealing sensitive information
ExplanationExploiting human behavior for information.
#11
In an OPSEC analysis, what is the purpose of identifying critical information?
To protect it from disclosure to adversaries
ExplanationPreventing adversaries from accessing crucial data.
#12
What is the purpose of conducting an OPSEC assessment?
To identify vulnerabilities and develop countermeasures
ExplanationIdentifying weaknesses to strengthen security.