1.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without(a) Encryption key(b) Decryption key(c) Primary key(d) Authorised keyI had been asked this question during an interview.This is a very interesting question from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management

Answer»

Right answer is (b) Decryption KEY

Best explanation: EVEN if the MESSAGE is intercepted by an enemy, the enemy, not knowing the key, will not be able to decrypt and understand the message.



Discussion

No Comment Found

Related InterviewSolutions