CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 2
CIS 502 Final Exam Guide
FOR MORE CLASSES VISIT
www.cis502mentor.com
•
1
Two parties are exchanging messages using
public key cryptography. Which of the following statements
describes the proper procedure for transmitting an encrypted
message?
•
•
2
3
Public key cryptography is another name for:
A running-key cipher can be used when:
•
4
Two parties, Party A and Party B, regularly
exchange messages using public key cryptography. One party,
Party A, believes that its private encryption key has been
compromised. What action should Party B take?
•
5
Two parties that have never communicated
before wish to send messages using symmetric encryption key
cryptography. How should the parties begin?
•
6
A stream cipher encrypts data by XORing
plaintext with the encryption key. How is the ciphertext
converted back into plaintext?