CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 4
     
 • 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?
 • 8 The Advanced Encryption Standard is another name for which cipher:
 • 9 All of the following statements about the polyalphabetic cipher are true EXCEPT:
 • 10 Which U. S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records?
 • 11 A security incident as defined as:
 • 12 An organization has developed its firstever computer security incident response procedure. What type of test should be undertaken first?
 • 13 The( ISC) 2 code of ethics includes all of the following EXCEPT:
 • 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?
 • 8 The Advanced Encryption Standard is another name for which cipher:
 • 9 All of the following statements about the polyalphabetic cipher are true EXCEPT:
 • 10 Which U. S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records?
 • 11 A security incident as defined as:
 • 12 An organization has developed its firstever computer security incident response procedure. What type of test should be undertaken first?
 • 13 The( ISC) 2 code of ethics includes all of the following EXCEPT: