McqMate
Q. |
In same keys are implemented for encrypting as well as decrypting the information. |
A. | symmetric key encryption |
B. | asymmetric key encryption |
C. | asymmetric key decryption |
D. | hash-based key encryption |
Answer» A. symmetric key encryption |
View all MCQs in
Information Cyber Security (ICS)No comments yet