Training Exam with Verified Detailed
Answers
OPSEC is a cycle used to identify, analyze, and control _____
indicating friendly actions associated with military operations and
other activities. -
correct answer ✅critical information
_____ are friendly detectable actions and open source information
that can be interpreted or pieced together by an adversary to
derive critical information. -
correct answer ✅Indicators.
Which of the following are examples of vulnerabilities exploited by
our adversaries to collect our information? -
correct answer ✅All the Above
The loss of sensitive information, even unclassified small bits of
information, can have a direct and negative impact on operations. -
correct answer ✅True
The adversary is collecting information regarding your organizations
mission, from the trash and recycling. What is the adversary
exploiting? -
correct answer ✅a vulnerability