DoD Annual TrainingAnswer Key

Third Step Of Opsec Process

8 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Countermeasures control or hide _______ and reduce vulnerabilities.

ANSWER

Indicators

QUESTION 2

OPSEC is designed to protect __________.

ANSWER

Critical Information

QUESTION 3

Risk is the measure of the _____ an adversary will compromise key operational information.

ANSWER

Probability

QUESTION 4

Which of the following does NOT define OPSEC?

ANSWER

A Security program used to punish careless individuals.

QUESTION 5

A vulnerability is a _____ that provides an adversary opportunity for exploitation.

ANSWER

Weakness

QUESTION 6

What is the third step of the OPSEC 5 process?

ANSWER

Analyze Vulnerabilities

QUESTION 7

A viable threat is indicated by ________.

ANSWER

Intent and capability

QUESTION 8

what type of information does OPSEC safeguard?

ANSWER

Intentions and Capabilities

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials