This document provides exercises for part 3 of a security textbook. It lists conceptual exercises asking about advantages and disadvantages of web of trust vs certificate authority trust models and how symmetric encryption can provide authentication, confidentiality, and message integrity. It also provides a programming problem to extend an AES encryption program to compute and verify a MAC on encrypted messages using separate keys for encryption and MAC computations.