DAF Operations Security Awareness Training
Which of the following represents critical information
Deployment dates and locations.
The adversary CANNOT determine our operations or missions by piecing together small details of information and indicators.
False
OPSEC is a cycle that involves all of the following EXCEPT
Identify adversary actions to conceal their information and intentions.
_____ are friendly detectable actions and open source information that can be interpreted or pieced together by an adversary to derive critical information.
Indicators.
_________ _________ are planned actions to affect collection, analysis, delivery, or interpretation of information.
OPSEC countermeasures.
You are out with friends at a local establishment. A stranger walks up to you and starts to ask about your job and offers to buy you a drink. What should you do?
Politely decline and change the subject.
OPSEC is a dissemination control category within the Controlled Unclassified Information (CUI) program
True
The loss of sensitive information, even unclassified small bits of information, can have a direct and negative impact on operations.
True
The adversary is collecting information regarding your organizations mission, from the trash and recycling. What is the adversary exploiting?
a vulnerability
An adversary with the ____ and ____ to undertake any actions detrimental to the success of programs, activities, or operations describes an OPSEC threat.
capability, intent.
OPSEC is a cycle used to identify, analyze, and control _____ indicating friendly actions associated with military operations and other activities.
critical information
The purpose of OPSEC in the workplace is to ________
reduce vulnerabilities to friendly mission accomplishment.
Which of the following are examples of vulnerabilities exploited by our adversaries to collect our information?
All the Above
Who should unit members contact when reporting OPSEC concerns?
All the above
