1.

In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

A. Symmetric Key Encryption
B. Asymmetric Key Encryption
C. Asymmetric Key Decryption
D. Hash-based Key Encryption
Answer» C. Asymmetric Key Decryption


Discussion

No Comment Found