• 1 Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message?
• 2 Public key cryptography is another name for:
• 3 A running-key cipher can be used when:
• 4 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext?
• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?
• 8 The Advanced Encryption Standard is another name for which cipher:
FOR MORE CLASSES VISIT www. cis502mentor. com
• 1 Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message?
• 2 Public key cryptography is another name for:
• 3 A running-key cipher can be used when:
• 4 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext?
• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?
• 8 The Advanced Encryption Standard is another name for which cipher: