DoD Annual TrainingAnswer Key

Opsec Process Steps

29 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Identification of critical information

ANSWER

- The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

QUESTION 2

What are the OPSEC five steps?

ANSWER

1. Identification 2. Analysis of threats 3. Analysis of vulnerabilities 4. Assessment of risks 5. Application of appropriate countermeasures

QUESTION 3

Identification of critical information (Step 1)

ANSWER

The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

QUESTION 4

Examples for step 1

ANSWER

- Core network infrastructure - Information security capability - Business information - Business critical applications - Employee information - Intellectual property

QUESTION 5

Business information

ANSWER

Mergers and acquistion

QUESTION 6

Business critical applications

ANSWER

- Manufacturing applications - Enterprise resource management platforms

QUESTION 7

Employee information

ANSWER

Identification of system administrators

QUESTION 8

Intellectual property

ANSWER

- Planning documentation - Schematics - Blueprints

QUESTION 9

Analysis of threats (Step 2)

ANSWER

Deals with identification the adversaries, their intent, and their capability to use the information against an organization. Once we identify the threats, we can study their Techniques, Tactics, and Procedures (TTPs) and start prioritizing how we can monitor for those specific activities.

QUESTION 10

Analysis of vulnerabilities (Step 3)

ANSWER

- A vulnerability is the state of being unprotected from the likelihood of being attacked, physically or emotionally. - By understanding the adversary their intent, and their capability, an organization can focus on identifying the potential vulnerabilities that exist in the enterprise.

QUESTION 11

Assessment of risks

ANSWER

- Once vulnerabilities are identified the vulnerabilities must go through the organizations process. This process evaluates each vulnerability and assigns it based on the sum of the probability of exploitation and impact to organization.

QUESTION 12

Examples of probability levels

ANSWER

- Certain - Likely - Possible - Unlikely - Rare

QUESTION 13

Examples of impact levels

ANSWER

- Negligible loss - Marginal Loss - Moderate Loss - Critical Loss - Catastrophic Loss

QUESTION 14

Certain

ANSWER

100% chance it will happen

QUESTION 15

Likely

ANSWER

>80% chance it will happen

QUESTION 16

Possible

ANSWER

60-79% chance it will happen

QUESTION 17

Unlikely

ANSWER

11-59% chance it will happen

QUESTION 18

Rare

ANSWER

Less than 10% chance it will happen

QUESTION 19

Negligible Loss

ANSWER

If this happens, it won't bother us to much.

QUESTION 20

Marginal Loss

ANSWER

If this happens, it will be an annoyance, but we can get by.

QUESTION 21

Moderate Loss

ANSWER

There will need to be a few projects to get us back to where we were.

QUESTION 22

Critical Loss

ANSWER

There will be some major projects to get us back to where we were.

QUESTION 23

Catastrophic Loss

ANSWER

We need to start from the beginning because there will be nothing left.

QUESTION 24

Examples of levels of risk

ANSWER

- High - Medium - Low

QUESTION 25

Application of appropriate countermeasures (Step 5)

ANSWER

After the risk assessment, organizations should be able yo prioritize resources to do - Avoid the risk - Control/mitigate the risk - Accept the risk - Transfer thee risk

QUESTION 26

Avoid the risk

ANSWER

Change planning to work around the problem.

QUESTION 27

Control/mitigate the risk

ANSWER

Isolate the problem and reduce the impact to the organizations: - Network segmentation - Access control lists - Credential management

QUESTION 28

Accept the erisk

ANSWER

Acknowledge that the problem exists

QUESTION 29

Transfer the risk

ANSWER

- Cyber insurance - Service providers

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials