πŸ“Š Information Cyber Security
Q. In same keys are implemented for encrypting as well as decrypting the information.
  • (A) symmetric key encryption
  • (B) asymmetric key encryption
  • (C) asymmetric key decryption
  • (D) hash-based key encryption
πŸ’¬ Discuss
βœ… Correct Answer: (A) symmetric key encryption

You must be Logged in to update hint/solution

πŸ’¬ Discussion


πŸ“Š Question Analytics

πŸ‘οΈ
364
Total Visits
πŸ“½οΈ
1 y ago
Published
πŸŽ–οΈ
Praveen Singh
Publisher
πŸ“ˆ
92%
Success Rate