

MCQOPTIONS
Saved Bookmarks
1. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
A. | Encryption key |
B. | Decryption key |
C. | Primary key |
D. | Authorised key |
Answer» C. Primary key | |