CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 2

============================================= CIS 502 Final Exam Guide FOR MORE CLASSES VISIT www . cis502mentor . com
• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper rocedure for transmitting an encrypted message ?
• 2 Public key cryptography is another name for :
• 3 A running-key cipher can be used when :
• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?

============================================= CIS 502 Final Exam Guide FOR MORE CLASSES VISIT www . cis502mentor . com

• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper rocedure for transmitting an encrypted message ?

• 2 Public key cryptography is another name for :

• 3 A running-key cipher can be used when :

• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?

• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?

• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?