Work related information posted to social networking sites or discussed in public may create
... [Show More]
___________ that can be exploited by the unauthorized recipient. -Threats -Indicators -Vulnerabilities -Risk
Which is not an example of an OPSEC countermeasure? -Make indicators seem unimportant. -Minimize predictable patterns. -Protecting critical information. -Sudden change to a predictable routine.
Match the five-step OPSEC process with the action associated with
[Show Less]