CIS 502 All Assignments CIS 502 All Assignments | Page 2
Click Below Link To Purchase
www.foxtutor.com/product/cis-502-final-exam-guide
1
Two parties are exchanging messages using public key cryptography. Which of the
following statements describes the proper procedure for transmitting an encrypted message?
• 2
• 3
Public key cryptography is another name for:
A running-key cipher can be used when:
•
4
Two parties, Party A and Party B, regularly exchange messages using public key
cryptography. One party, Party A, believes that its private encryption key has been
compromised. What action should Party B take?
•
5
Two parties that have never communicated before wish to send messages
using symmetric encryption key cryptography. How should the parties begin?
•
6
A stream cipher encrypts data by XORing plaintext with the encryption key. How is
the ciphertext converted back into plaintext?
•
7
Two parties that have never communicated before wish to send messages using
asymmetric key cryptography. How should the parties begin?