Management II (Tactical) OA ACTUAL
EXAM 2025/2026 COMPLETE QUESTIONS
WITH CORRECT DETAILED ANSWERS ||
100% GUARANTEED PASS
<BRAND NEW VERSION>
1. ____________are another area of wireless security concern. Headsets for
cell phones, mice, keyboards, Global Positioning System (GPS) devices, and
many other interface devices and peripherals are connected via Bluetooth. -
ANSWER ✓ a. Bluetooth, or IEEE 802.15, personal area networks (PANs)
2. _____________ is a tracking technology based on the ability to power a
radio transmitter using current generated in an antenna when placed in a
magnetic field. RFID can be triggered/powered and read from a considerable
distance away (often hundreds of meters). RFID can be attached to devices
or integrated into their structure, such as notebook computers, tablets,
routers, switches, USB flash drives, portable hard drives, and so on. This can
allow for quick inventory tracking without having to be in direct physical
proximity of the device. Simply walking into a room with an RFID reader
can collect the information transmitted by the activated chips in the area. -
ANSWER ✓ Radio Frequency Identification (RFID)
3. _______ is a standard that establishes radio communications between
devices in close proximity (like a few inches versus feet for passive RFID).
It lets you perform a type of automatic synchronization and association
between devices by touching them together or bringing them within inches
of each other. NFC is a derivative technology from RFID and is itself a form
, of field-powered or triggered device. - ANSWER ✓ Near-field
communication (NFC)
4. ___________ represent an often-overlooked security issue. Cordless phones
are designed to use any one of the unlicensed frequencies, in other words,
900 MHz, 2.4 GHz, or 5 GHz. These three unlicensed frequency ranges are
employed by many different types of devices, from cordless phones and
baby monitors to Bluetooth and wireless networking devices. The issue that
is often overlooked is that someone could easily eavesdrop on a conversation
on a cordless phone since its signal is rarely encrypted. - ANSWER ✓
Cordless phones
5. __________ is defined by the IEEE 802.11 standard. It was designed to
provide the same level of security and encryption on wireless networks as is
found on wired or cabled networks. WEP provides protection from packet
sniffing and eavesdropping against wireless transmissions
6. WEP was cracked almost as soon as it was released. Today, it is possible to
crack WEP in less than a minute, thus rendering it a worthless security
precaution - ANSWER ✓ Wired Equivalent Privacy (WEP)
7. ____________ was designed as the replacement for WEP; it was a
temporary fix until the new 802.11i amendment was completed. The process
of crafting the new amendment took years, and thus WPA established a
foothold in the marketplace and is still widely used today. Additionally,
WPA can be used on most devices, whereas the features of 802.11i exclude
some lower-end hardware. - ANSWER ✓ Wi-Fi Protected Access (WPA)
8. Eventually, a new method of securing wireless was developed that is still
generally considered secure. This is the amendment known as 802.11i or
___________ It is a new encryption scheme known as the Counter Mode
Cipher Block Chaining Message Authentication Code Protocol (CCMP),
which is based on the AES encryption scheme - ANSWER ✓ Wi-Fi
Protected Access 2 (WPA2).
9. Both WPA and WPA2 support the enterprise authentication known as
__________ a standard port-based network access control that ensures that
clients cannot communicate with a resource until proper authentication has
taken place. Effectively, 802.1X is a hand-off system that allows the
, wireless network to leverage the existing network infrastructure's
authentication services - ANSWER ✓ 802.1X/EAP
10.______________ is not a specific mechanism of authentication; rather it is
an authentication framework. Effectively, EAP allows for new
authentication technologies to be compatible with existing wireless or point-
to-point connection technologies - ANSWER ✓ Extensible Authentication
Protocol (EAP)
11._________ encapsulates EAP methods within a TLS tunnel that provides
authentication and potentially encryption. Since EAP was originally
designed for use over physically isolated channels and hence assumed
secured pathways, EAP is usually not encrypted. So PEAP can provide
encryption for EAP methods. - ANSWER ✓ Protected Extensible
Authentication Protocol (PEAP)
12._____________ is a Cisco proprietary alternative to TKIP for WPA -
ANSWER ✓ Lightweight Extensible Authentication Protocol (LEAP)
13.________________ was designed as the replacement for WEP without
requiring replacement of legacy wireless hardware. TKIP was implemented
into 802.11 wireless networking under the name WPA (Wi-Fi Protected
Access). - ANSWER ✓ Temporal Key Integrity Protocol (TKIP)
14.______________ was created to replace WEP and TKIP/WPA. CCMP uses
AES (Advanced Encryption Standard) with a 128-bit key. CCMP is the
preferred standard security protocol of 802.11 wireless networking indicated
by 802.11i. To date, no attacks have yet been successful against the
AES/CCMP encryption. - ANSWER ✓ CCMP (Counter Mode with Cipher
Block Chaining Message Authentication Code Protocol)
15.__________ is a type of geek graffiti that some wireless hackers used during
the early years of wireless (1997-2002). It's a way to physically mark an area
with information about the presence of a wireless network - ANSWER ✓
War chalking
16._____________are standby facilities large enough to handle the processing
load of an organization and equipped with appropriate electrical and
environmental support systems. They may be large warehouses, empty
, office buildings, or other similar structures. However, a cold site has no
computing facilities (hardware or software) preinstalled and also has no
active broadband communications links. Many cold sites do have at least a
few copper telephone lines, and some sites may have standby links that can
be activated with minimal notification. - ANSWER ✓ a. Cold sites
17.What is a vulnerability assessment? - ANSWER ✓ often include results
from vulnerability scans, but the assessment will do more; sometimes used
to indicate a risk assessment or risk analysis
18.What are the two categories of incident sources? - ANSWER ✓ Internal and
external sources
19.What is an internal incident source? - ANSWER ✓ Incidents are usually
identified by the information technology (IT) teams such as the network,
desktop, or IT surveillance teams, the users through the help desk, or even
IT partners.
20.What is an external incident source - ANSWER ✓ usually originate from
coworkers, external partners, or law enforcement, which may contact the
information security team to declare an incident
21.What is the goal of the CCM? - ANSWER ✓ Cyber Crisis Management
aims to implement a set of specific organizational and technical measures to
allow specially mobilized staff to deploy quickly, effectively, and efficiently
during the crisis and respond to potentially unknown situations
22.What is a CDU? - ANSWER ✓ Crisis decision-making unit
23.What are the Cyber Crisis Management Steps? - ANSWER ✓ Alert &
qualification, crisis handling, execution and surveillance, and crisis closure
24.What is the key difference between cyber and general crisis management? -
ANSWER ✓ the cyber specificities, especially regarding how to stop the
attack
25.Define an organization and what is it influenced by? - ANSWER ✓
Organizations are social systems that are influenced by human factors.