CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 3

• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin? • 8 The Advanced Encryption Standard is another name for which cipher: • 9 All of the following statements about the polyalphabetic cipher are true EXCEPT: • 10 Which U.S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records? • 11 A security incident as defined as: • 12 An organization has developed its firstever computer security incident response procedure. What type of test should be undertaken first?