M Mr. Dubey • 97.30K Points Coach Q. In same keys are implemented for encrypting as well as decrypting the information. (A) symmetric key encryption (B) asymmetric key encryption (C) asymmetric key decryption (D) hash-based key encryption Correct Answer - Option(A) Views: 502 Filed under category Information Cyber Security (ICS) Share
Discusssion
Login to discuss.