MCQOPTIONS
Saved Bookmarks
| 1. |
In same keys are implemented for encrypting as well as decrypting the information. |
| A. | symmetric key encryption |
| B. | asymmetric key encryption |
| C. | asymmetric key decryption |
| D. | hash-based key encryption |
| Answer» B. asymmetric key encryption | |