1.

In _____________________ same keys are implemented for encrypting as well as decrypting the information.

A. Symmetric Key Encryption
B. Asymmetric Key Encryption
C. Asymmetric Key Decryption
D. Hash-based Key Encryption
Answer» B. Asymmetric Key Encryption


Discussion

No Comment Found