CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 3
•
7
Two parties that have never communicated before
wish to send messages using asymmetric key cryptography.
How should the parties begin?
•
8
•
9
•
The Advanced Encryption Standard is another
name for which cipher:
All of the following statements about the
polyalphabetic cipher are true EXCEPT:
10
Which U.S. law gives law enforcement
organizations greater powers to search telephone, e-mail,
banking, and other records?
•
11
A security incident as defined as:
•
12
An organization has developed its first-
ever computer security incident response procedure. What type
of test should be undertaken first?
•
13
The (ISC)2 code of ethics includes all of the
following EXCEPT:
•
14
The allegation that an employee has violated
company policy by downloading child pornography onto a
company workstation should result in:
•
15
A case of employee misconduct that is the subject
of a forensic investigation will likely result in a court
proceeding. What should included in the forensic investigation: