Q.

In same keys are implemented for encrypting as well as decrypting the information.

A. symmetric key encryption
B. asymmetric key encryption
C. asymmetric key decryption
D. hash-based key encryption
Answer» A. symmetric key encryption
945
0
Do you find this helpful?
1

Discussion

No comments yet