• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper procedure for transmitting an encrypted message ?
• 2 Public key cryptography is another name for :
• 3 A running-key cipher can be used when :
• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?
• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography . How should the parties begin ?
• 8 The Advanced Encryption Standard is another name for which cipher :
FOR MORE CLASSES VISIT www . cis502mentor . com
• 1 Two parties are exchanging messages using public key cryptography . Which of the following statements describes the proper procedure for transmitting an encrypted message ?
• 2 Public key cryptography is another name for :
• 3 A running-key cipher can be used when :
• 4 Two parties , Party A and Party B , regularly exchange messages using public key cryptography . One party , Party A , believes that its private encryption key has been compromised . What action should Party B take ?
• 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography . How should the parties begin ?
• 6 A stream cipher encrypts data by XORing plaintext with the encryption key . How is the ciphertext converted back into plaintext ?
• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography . How should the parties begin ?
• 8 The Advanced Encryption Standard is another name for which cipher :