CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 3

• 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin? • 8 • 9 • The Advanced Encryption Standard is another name for which cipher: All of the following statements about the polyalphabetic cipher are true EXCEPT: 10 Which U.S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records? • 11 A security incident as defined as: • 12 An organization has developed its first- ever computer security incident response procedure. What type of test should be undertaken first? • 13 The (ISC)2 code of ethics includes all of the following EXCEPT: • 14 The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in: • 15 A case of employee misconduct that is the subject of a forensic investigation will likely result in a court proceeding. What should included in the forensic investigation: