CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 2

CIS 502 Week 4 Case Study 2 Social Engineering Attacks and Counterintelligence (2 Papers) CIS 502 Week 7 Case Study 3 Mobile Devices Security (2 Papers) CIS 502 WEEK 8 CASE STUDY Mobile Device Security and Other Threats (2 Papers) =========================================== = CIS 502 Final Exam Guide FOR MORE CLASSES VISIT www.cis502mentor.com • 1 Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message? • 2 Public key cryptography is another name for: