Section 17B--Operations Security Flashcards

1
Q

Which security process uses a cycle to identify, analyze, and control critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations?

A

Operations security (OPSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the active defense or exploitation of operational profiles at a given military installation?

A

Signature management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is accomplished by implementing measures to deny adversary collection of critical information?

A

Defense of operational profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each functional activity generates its own set of more-or-less unique signatures and associations. What is the sum of these signatures and associations?

A

The activity’s profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value?

A

Profiling process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly