7D Flashcards

1
Q

The purpose of ___ ___ (OPSEC) is to reduce the vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information. OPSEC applies to all activities that prepare, sustain, or employ forces during all phases of operations.

A

Operation Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OPSEC is a process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other activities to:

A
  • Identify those actions that can be observed by adversary intelligence systems.
  • Determine what specific indications could be collected, analyzed, and interpreted to derive critical information in time to be useful to adversaries.
  • Select and execute measures that eliminate or reduce the vulnerabilities of friendly actions to adversary exploitation to an acceptable level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OPSEC is the responsibility of ___ AF personnel.

A

all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ ___ is a fact about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively, to guarantee failure or unacceptable consequences for friendly mission accomplishment.

A

Critical Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The product of the first step in the OPSEC process is to record your critical information and indicators in a..?

A

CIIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does CIIL stand for?

A

Critical Information and Indicators List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An _____ is a friendly detectable action and open-source information that can be interpreted or pieced together by an adversary to derive critical information. The adversary essentially uses your critical information to support their decision-making process. The adversary has, then, exploited your vulnerability to obtain an advantage over you.

A

indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the easiest ways for our adversaries to gather information about military operations is through ___ ___.

A

social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly