CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 3
•
7
Two parties that have never communicated before
wish to send messages using asymmetric key cryptography.
How should the parties begin?
•
8
The Advanced Encryption Standard is another
name for which cipher:
•
9
All of the following statements about the
polyalphabetic cipher are true EXCEPT:
•
10
Which U.S. law gives law enforcement
organizations greater powers to search telephone, e-mail,
banking, and other records?
•
11
A security incident as defined as:
•
12
An organization has developed its firstever computer security incident response procedure. What type
of test should be undertaken first?