Which of the following is not an operations security (OPSEC) objective?
Develop OPSEC procedures and techniques
Document accidents and perform corrective actions
Systematically assess OPSEC status at all operational levels
Identify those portions of an operation that require protection
What are the three categories of possible sources of military information given the enemy advance warning of an operation?
Operation, procedures, and communication
Employment methods, objectives, and procedures
Operations, data collection, and time and location
Operation objectives, procedures, and communications
The principles of OPSEC must apply to what stage of operations?
Planning only
Evaluations only
Execution of orders only
All stages of an operation
Commanders emphasize OPSEC application to make sure it is considered to the maximum extent
At all levels and in all operations
At all levels and only during hostilities
At all levels and only during nuclear operations
Only at the maintenance level during secret operations
Under OPSEC, you should be looking for what communications intelligence indicator?
Any use of secure voice
Any use of automatic digital network
Use of public affairs to communicate with the local media
Use of unchanging or infrequently changing call signs or radio frequencies
Which threat to the Air Force resources usually involves the circumvention of human controls and physical security measures?
Loss
Theft
Vandalism
Destruction
Normally, as a 2W1X1, the secure area you will work in is the:
Gun shop
Flight line
Support section
Administration section
if weapons are consolidated at a deployed location, the persons charged with custody of the weapons must be:
Armed and able to immobilize weapons
Able to sound an alarm and immobilize weapons
Armed and have the capability to sound an alarm
A member of the response force who is available for deployment within 10 minutes
How are the values of Air Force resources described?
Monetary and military
Sensitivity and military
Monetary and sensitivity
Sensitivity and capability
the sensitivities of Air Force resources can best be described by placing them into:
Risk categories
Value categories
Sensitivity categories
Capability categories
Which item is an example of a risk category 1 arms and munitions item?
Explosives used in demolition operations
Man-portable missiles and rockets in a ready to fire configuration
Caliber .50 and larger ammunition with explosive-filled projectile
Light, automatic weapons up to and including .50 caliber and M-240D machine guns
In which arms and munition risk category are bomb fuzes assigned?
II
III
IV
V
The nuclear weapons related material (NWRM) term "unique item identifiers" refers to:
All of the required procedures and measures used to secure facilities and work areas
The ability to identify and account for the condition and location of material anywhere in the supply chain at any point in time
A set of data elements marked on items that are globally unique, unambiguous, and robust enough to ensure data information quality throughout life and to support multifaceted business applications and users
Is a classification of NWRM assets that would not be identified as NWRM by the other parts of the matrix but would put doubt in the public's eyes on the Air Force's capabilities to protect nuclear weapons systems
What is performed to validate an installed asset by serial number and/or unique item identifier (UII) for nuclear weapons related material (NWRM) times that would need to be disassembled to verify accountability?
Disassembly
Barcode scan
Item unique identifier check
Records check
OPSEC is designed to protect unclassified, highly visible, and classified aspects of an operation.
In regards to Air Force resource security, _______________ generally occur when some person fails to properly safeguard resources.
Burglary
An armed response force must be capable of responding in how many minutes?
5 minutes
10 minutes
15 minutes
20 minutes