Click Below Link To Purchase www.foxtutor.com/product/cis-502-final-exam-guide 1 Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message? • 2 • 3 Public key cryptography is another name for: A running-key cipher can be used when: • 4 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take? • 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin? • 6 A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext? • 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?