McqMate
| Q. |
In same keys are implemented for encrypting as well as decrypting the information. |
| A. | symmetric key encryption |
| B. | asymmetric key encryption |
| C. | asymmetric key decryption |
| D. | hash-based key encryption |
| Answer» A. symmetric key encryption | |
View all MCQs in
Information Cyber Security (ICS)No comments yet