============================================= CIS 502 Final Exam Guide FOR MORE CLASSES VISIT www . cis502mentor . com
• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper rocedure for transmitting an encrypted message ?
• 2 Public key cryptography is another name for :
• 3 A running-key cipher can be used when :
• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?
============================================= CIS 502 Final Exam Guide FOR MORE CLASSES VISIT www . cis502mentor . com
• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper rocedure for transmitting an encrypted message ?
• 2 Public key cryptography is another name for :
• 3 A running-key cipher can be used when :
• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?