You are a project manager for one of the Army's internal development teams, and one of your coworkers from a different department asks for specific details on the project you are currently working on. Can you share this information?
  • Responses sharing or asking for sensitive information
  • Which of the following should you NOT bring to a secret briefing?
  • The name of the restaurant
  • NO, because fellow coworkers could potentially be insiders?
-party-it's going to be so brutal
  • What does CALI stands for?
  • Not so sensitive Information:
  • Non-Critical Information:
  • Examples of Criminals are:
Imagine you are eating lunch with a friend at a fancy restaurant. You take a picture of your meal with your phone and prepare to post it on Instagram. Which of the following pieces of information should you leave out of the post?
  • What are other ASSETS?
  • The name of the restaurant
  • Log off your computer
  • Examples of Terrorist:
-allied nations-foreign intelligence service
  • Examples of Insiders:
  • Examples of Terrorist:
  • Examples of Foreign Governments:
  • Examples of Criminals are:
-the names of family members-high-risk targets-non-public Army events-shortfalls in funding for training
  • Sensitive Information:
  • Critical Information:
  • NO, because allied governments are still considered potential threats
  • What are other ASSETS?
can be domestics or international
  • Examples of Terrorist:
  • Examples of Insiders:
  • Examples of Foreign Governments:
  • Examples of Criminals are:
-burning-shredding confidential files
  • SAFE:
  • Examples of Insiders:
  • Examples of Criminals are:
  • Not Safe:
CAPABILITIES- the "C" for CALITACTICS-the first "T" in the acronym TTPINTENTIONS-the "I" in the acronym CALIACTIVITIES- the "A" in the acronym CALIWHAT-the question word that describes a thing or event
  • ACROSS Puzzle answers
  • Answer the question
  • What does CALI stands for?
  • DOWN Puzzle answers
Which of the following actions is a mandated OPSEC measure that should be conducted before leaving your work area in order to protect critical information?
  • Terrorists can be both domestics and international
  • Encrypting the email
  • Log off your computer
  • Receiving an OPSEC review on the post
Which of the following is a mandated OPSEC measure that should be conducted before sending email?
  • Log off your computer
  • Receiving an OPSEC review on the post
  • Encrypting the email
  • Terrorists can be both domestics and international
smart watch
  • NO, because fellow coworkers could potentially be insiders?
  • Which of the following should you NOT bring to a secret briefing?
  • Each of the following answer choices describes use of personal device. Which action could potentially result in the compromise of critical information?
  • Responses sharing or asking for sensitive information
Which of the following statements is true about terrorist?
  • Encrypting the email
  • Receiving an OPSEC review on the post
  • Terrorists can be both domestics and international
  • Responses sharing or asking for sensitive information
-receiving business emails on your cell phone
  • Each of the following answer choices describes use of personal device. Which action could potentially result in the compromise of critical information?
  • Select the following correct answer
  • Examples of Foreign Governments:
  • Which of the following should you NOT bring to a secret briefing?
-critical information list-social security card-for official use only
  • Examples of Foreign Governments:
  • Sensitive Information:
  • Select the following correct answer
  • Receiving an OPSEC review on the post
WHEN-the question word that describes a timePROCEDURES- the "P" in the acronym TTPWHERE- the question word that describes a placeTECHNIQUES-the second "T" in the acronym TTPLIMITATIONS-the "L" in the acronym CALIHOW-the question word that describes a methodWHO-the question word that describers a person or group
  • ACROSS Puzzle answers
  • Encrypting the email
  • DOWN Puzzle answers
  • Log off your computer
-scam artist-identity thieves-hackers
  • Examples of Terrorist:
  • Examples of Criminals are:
  • Examples of Insiders:
  • Examples of Foreign Governments:
ID Badge-identify the critical information by selecting items on the screen
  • Answer the question
  • Encrypting the email
  • What is OPSEC?
  • Select the following correct answer
CapabilitiesActivitiesLimitationsIntentions
  • Examples of Criminals are:
  • What does CALI stands for?
  • Examples of Terrorist:
  • What are other ASSETS?
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0