InterviewSolution
Saved Bookmarks
| 1. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without(a) Encryption key(b) Decryption key(c) Primary key(d) Authorised keyI had been asked this question during an interview.This is a very interesting question from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management |
|
Answer» Right answer is (b) Decryption KEY |
|