Q.

In same keys are implemented for encrypting as well as decrypting the information.

A. symmetric key encryption
B. asymmetric key encryption
C. asymmetric key decryption
D. hash-based key encryption
Answer» A. symmetric key encryption
1.9k
0
Do you find this helpful?
11

Discussion

No comments yet