1.How is the process supposed to work?
That's a bit of a vague question.
How would the process of querying the table with ref to this column work after encryption?
If you query it without opening the key and calling the decryption function, you'll see the encrypted data.
May I suggest you read over the encryption section in BoL. It's fairly good. If you have specific questions afterwards, post them.
Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)SQL In The Wild
: Discussions on DB performance with occasional diversions into recoverability
We walk in the dark places no others will enter
We stand on the bridge and no one may pass