Section 4 Flashcards

1
Q

Operations security process

A
  1. identification of critical information
  2. analysis of threats
  3. analysis of vulnerabilities
  4. assessment of risks
  5. application of countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of intelligence gathering and analysis to support business decisions.

A

competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

first law: know the threats

A
  • if you don’t know the threat, how do you know what to protect?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

second law: know what to protect

A

if you don’t know what to protect, how do you know you are protecting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

third law: protect the information

A

if you are not protecting the information, the dragon wins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term refers to the practice of managing information gathering activities directed at an organization?

A

competitive counterintelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the responsibility of the Interagency OpSec Support Staff (IOSS)?

A

Provide multiple agencies with a wide variety of security awareness and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of social engineering attack utilizes credible scenarios to lure people into disclosing sensitive information?

A

pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does endpoint protection help reduce?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which part of a security awareness program locks down sensitive information before exiting?

A

clean desk policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly