Study test in depth Examination and 100% correctly verified
Solutions Latest version 2025/2026
A type of cipher that takes a predetermined number of bits in the plaintext message
(commonly 64 bits) and encrypts that block - correct answer Block cipher
A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time - correct
answer Stream cipher
A set of symmetric block ciphers endorsed by the US government through NIST. Shares
the same block modes that DES uses and also includes other modes such as XEX-
based Tweaked CodeBook (TCB) mode - correct answer AES
Also known as public key cryptography, this method uses two keys: a public key and a
private key. - correct answer Asymmetric key cryptography
Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic -
correct answer Secure Sockets Layer (SSL) protocol
Also referred to as message digests, these functions do not use a key - correct answer
Hash functions
Infrastructure that includes the CAs that issue and verify certificates and the registration
authorities (RAs) that verify the identity of the individuals associated with the certificates
- correct answer Public key infrastructure (PKI)
______ regulates the financial practice and governance of corporations. This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform
this task are A to H and alt+1 to alt+9.
A.GLBA
,B.FISMA
C.SOX
D.FERPA
E.HIPAA - correct answer C.SOX
Regulations mandated by law, usually requiring regular audits and assessments -
correct answer Regulatory Compliance
This act safeguards privacy through the establishment of procedural and substantive
rights in personal data - correct answer The Federal Privacy Act of 1974
Question : Risk can be higher when ___________ services are used for computing
operations. This task contains the radio buttons and checkboxes for options. The
shortcut keys to perform this task are A to H and alt+1 to alt+9.
A.auditing
B.competitive intelligence
C.cloud computing
D.OPSEC - correct answer C.cloud computing
Laws of OPSEC
1.If you don't know what to protect, how do you know you are protecting it?
2.If you don't know the threat, how do you know what to protect?
3.If you are not protecting it (i.e. the information), THE DRAGON WINS! - correct
answer 1.If you don't know the threat, how do you know what to protect?
2.If you don't know what to protect, how do you know you are protecting it?
,3.If you are not protecting it (i.e. the information), THE DRAGON WINS!
During what phase of the operations security process do we match threats and
vulnerabilities? T
A.Assessment of risks
B.Analysis of vulnerabilities
C.Analysis of threats
D.Identification of critical information
E.Application of countermeasures - correct answer A.Assessment of risks
Haas' second law of operations security, "If you don't know what to protect, how do you
know you are protecting it?," maps to what step in the operations security process?
A.Analysis of threats
B.Analysis of vulnerabilities
C.Assessment of risks
D.Application of countermeasures
E.Identification of critical information - correct answer E.Identification of critical
information
You are leaving for an extended vacation and want to take steps to protect your home.
You set a timer to turn lights and the TV on and off at various times throughout the day,
suspend the mail delivery, and arrange for a neighbor to come in and water the plants.
What step in the operations security process do these actions demonstrate? This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform
this task are A to H and alt+1 to alt+9.
A.Identification of critical information
B.Analysis of threats
, C.Analysis of vulnerabilities
D.Assessment of risks
E.Application of countermeasures - correct answer E.Application of countermeasures
The process of intelligence gathering and analysis to support business decisions is
known as _______.
A.Competitive intelligence
B.Competitive business
C.Business intelligence
D.Business competition
E.Counter intelligence - correct answer A.Competitive intelligence
The study that was conducted to discover the cause of the information leak during the
Vietnam War was codenamed ________ and is now considered a symbol of OPSEC.
A.Sun Tzu
B.Vietnam Viper
C.The Art of War
D.Purple Dragon - correct answer D.Purple Dragon
The process of intelligence gathering and analysis in order to support business
decisions - correct answer Competitive intelligence
Name the five steps of the operations security process
1.Identification of critical information
2.Analysis of threats
3.Analysis of vulnerabilities
4.Assessment of risks