DoD Annual TrainingAnswer Key

An Advantage Of Integrating Opsec Principles

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

An adversary that is capable of collecting and exploiting information and has expressed the intent to do so is considered a:

ANSWER

Threat

QUESTION 2

_____ is the "so what" factor of risk assessment.

ANSWER

Threat

QUESTION 3

Stereotypes, patterns, and predictable actions are all types of:

ANSWER

Indicators

QUESTION 4

Which of the following is defined as a weakness in your operation?

ANSWER

Vulnerability

QUESTION 5

Which of the following countermeasures would likely be considered the most effective across all organizations?

ANSWER

Awareness training

QUESTION 6

An adversary is anyone with whom you do not wish to share your critical information.

ANSWER

True

QUESTION 7

NSDD298, signed by President Ronald Reagan in 1988, directed which organizations to establish OPSEC programs?

ANSWER

All executive departments and agencies with national security missions

QUESTION 8

An advantage of incorporating OPSEC principles into the planning stage of any operation is that it:

ANSWER

Provides for early detection of OPSEC problems.

QUESTION 9

Detectable activities or clues that can be pieced together by an adversary to compromise your operations are called:

ANSWER

Indicators

QUESTION 10

The value of OPSEC lies in its ability to:

ANSWER

Complement traditional security by augmenting security practices already in place

QUESTION 11

The probability that an adversary will exploit a weakness in your operation, tempered by the impact to your mission, is defined as the:

ANSWER

Risk

QUESTION 12

A countermeasure is anything that effectively reduces an adversary's ability to exploit our vulnerabilities.

ANSWER

True

QUESTION 13

Risk is a function of the:

ANSWER

Threat, vulnerability, and impact

QUESTION 14

An advantage of integrating OPSEC principles in your day-to-day operations is that it:

ANSWER

Makes OPSEC principles second nature to your employees.

QUESTION 15

The development of a countermeasure focuses directly on the:

ANSWER

Vulnerability it is designed to protect

QUESTION 16

Which of the following common vulnerabilities associated with family members usually involve the sharing of too many details? (more than one may apply)

ANSWER

Public conversations Social Media Trash

QUESTION 17

Which of the following should be taken into consideration when determining which critical information should be protected? (more than one may apply)

ANSWER

All of the above*

QUESTION 18

Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary?

ANSWER

Analyze vulnerabilities Identify critical information Apply countermeasures (All of these choices require you to look at your operation through the eyes of an adversary)

QUESTION 19

Lack of proper awareness training is an example of which of the following:

ANSWER

Vulnerability

QUESTION 20

Which step in the OPSEC process is a decision-making step because it helps the decision maker prioritize and decide whether or not to assign a countermeasure?

ANSWER

Assess risk

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials