DoD Annual TrainingAnswer Key

Opsec Level 2

54 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Operations Security

ANSWER

What does OPSEC stand for?

QUESTION 2

5 Step OPSEC Process

ANSWER

Critical Info; Threat; Vulnerability; Risk and Apply OPSEC measures (mitigation)

QUESTION 3

2 base components of Essential Secrecy

ANSWER

Traditional Security and Operations Security (OPSEC)

QUESTION 4

A category of OPSEC indicators is?

ANSWER

SPACE (signature; profile; association; contrast and exposure)

QUESTION 5

Good characteristics of a good CIL

ANSWER

Unclassified; 10 items or less; widest dissemination

QUESTION 6

Why conduct an OPSEC review?

ANSWER

Evaluate compliance to regulatory guidance, prevent potential release of critical information; to evaluate a product or document with new eyes

QUESTION 7

What is CALI?

ANSWER

Capabilities, Activities, Limitations, and Intentions

QUESTION 8

What is RISK?

ANSWER

The probability that an adversary will compromise your Critical Information and the resulting impact if successful

QUESTION 9

In order to have a threat, you must have what two components?

ANSWER

Intent and capability

QUESTION 10

What is VULNERABILITY?

ANSWER

It is the action of an adversary after careful observation, and positioning in order to plan to effectively act against a friendly organization

QUESTION 11

What is the regulation for SAP?

ANSWER

AR 380-381

QUESTION 12

What is the Army Regulation for OPSEC?

ANSWER

AR 530-1

QUESTION 13

When did Regan sign NSDD 298?

ANSWER

1988

QUESTION 14

Simple version of the OPSEC 5 step process

ANSWER

1. problem, 2. it could get worse, 3. damage, 4. timing (odds of it getting worse), 5. mitigation...

QUESTION 15

Essential Secrecy is?

ANSWER

The condition achieved from denial of critical information to adversaries through the combined efforts of: a.) Traditional Security programs and b.) the Operations Security process...

QUESTION 16

CALI maintains our "Element of Surprise" by?

ANSWER

Denying enemies information... It is a key part of Essential Secrecy

QUESTION 17

Who owns the OPSEC program...?

ANSWER

The Commander

QUESTION 18

Who determines what will and will not be protected?

ANSWER

The Commander

QUESTION 19

What is a key responsibility/duty of the OPSEC officer?

ANSWER

To support the Commander

QUESTION 20

Other responsibilities/duties of the OPSEC officer include?

ANSWER

1. Producing Official Policy Letter 2. Coordinating functions within a Working Group 3. Publishing an OPSEC SOP 4. Interagency Integration 5. Develop a CIL 6. Publish an Annual Report 7. Conduct/Promote OPSEC Training and Awareness 8. Conduct OPSEC Reviews 9. Take part in self/external program Assessments

QUESTION 21

Critical Information comes from?

ANSWER

1. Protected Sources 2. Open Sources 3. Detectible Actions NOTE: Intelligence Collection is not a Random Effort

QUESTION 22

All OPSEC measures are implemented to?

ANSWER

Protect Critical Information

QUESTION 23

Critical Information may be____________ or ____________ sensitive.

ANSWER

"Time" or "Event"

QUESTION 24

What is Threat driven?

ANSWER

OPSEC... Threat = Intent + Capability

QUESTION 25

What are some of the traditional Collection Methods?

ANSWER

HUMINT; SIGINT; GEOINT; OSINT and MASINT

QUESTION 26

Two types of HUMINT collection are?

ANSWER

Overt and Covert

QUESTION 27

Foreign Intelligence Services employ the following HUMINT methods?

ANSWER

1. Recruiting (R) 2. Elicitation (E) 3. Planting (P)

QUESTION 28

Thinking like an Adversary collecting Critical Information UNDERSTAND and REMEMBER that...

ANSWER

Collection is "not" a Random Effort

QUESTION 29

Levels of Vulnerabilities exist at the?

ANSWER

1. Strategic Level, (S) 2. Operational Level, and the (O) 3. Tactical Level (T)

QUESTION 30

Adversary analysts develop perceptions by?

ANSWER

1. Piecing the Indicators Together 2. Conducting a Comparative Analysis identifying Trends 3. Report Observations for Review Cand await Guidance

QUESTION 31

3 Categories of OPSEC Measures include?

ANSWER

1. Action Control (A) 2. Countermeasures (C) 3. Counter Analysis (C)

QUESTION 32

Action Control measures are?

ANSWER

Means of Mitigation, to include TRAINING...

QUESTION 33

Countermeasures can look like?

ANSWER

Signal Jamming

QUESTION 34

Counter analysis can look like?

ANSWER

Use of Deceptions / Decoys and False leads...

QUESTION 35

A form of Risk Management is a Table Top Exercise, why is this employed?

ANSWER

It helps leaders learn to make informed decisions regarding available courses of action.

QUESTION 36

What is the OPSEC definition of Risk?

ANSWER

The "probability" an adversary will compromise Critical Information and the "impact" is the severity of the damage taken when they are successful

QUESTION 37

What does R = I x ( T x V ) mean?

ANSWER

Risk equals Impact x threat x vulnerability

QUESTION 38

What is the current risk without OPSEC measures

ANSWER

Failure

QUESTION 39

FOIA is?

ANSWER

A public record. ANY official writing or recording.

QUESTION 40

How many FOIA exemptions are there?

ANSWER

(9) Nine

QUESTION 41

OPSEC Review supports a responsible release of records tagged under?

ANSWER

FOIA documents requests...

QUESTION 42

DD Form 254

ANSWER

Classified / Uncalssified Contract Review...

QUESTION 43

PAO is NOT the same as an?

ANSWER

OPSEC Review

QUESTION 44

How many Functional Elements are there?

ANSWER

(2) Two -- Warfighter & Non Warfighter

QUESTION 45

What is the purpose / possible uses for OPSEC Working Groups?

ANSWER

1. Awareness for the Cmd 2. Review Websites 3. Review Contracts

QUESTION 46

OPSEC Measures are?

ANSWER

Directive in nature

QUESTION 47

Risk Management?

ANSWER

Helps leaders make informed decisions regarding course of action

QUESTION 48

Probability is referred to as?

ANSWER

Hazard

QUESTION 49

Impact is referred to as?

ANSWER

Severity

QUESTION 50

Cyberspace is?

ANSWER

A global domain within the information environment

QUESTION 51

Cyberspace Operations consist if (3) three functions

ANSWER

1. Offensive cyber ops 2. Defensive cyber ops 3. DoD info network ops

QUESTION 52

What are some Types of cyber threats

ANSWER

1. FIS 2. Cyber Terrorist 3.. Criminals 4. Insiders 5. Hackers

QUESTION 53

Social Media uses are

ANSWER

1. Official 2. Professional 3. Personal

QUESTION 54

Critical Program Information ( CPI )

ANSWER

1. DoD 5230.25 2. DoD 5230.24

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials