InterviewSolution
Saved Bookmarks
| 1. |
In _____________________ same keys are implemented for encrypting as well as decrypting the information.(a) Symmetric Key Encryption(b) Asymmetric Key Encryption(c) Asymmetric Key Decryption(d) Hash-based Key EncryptionThe question was posed to me in an online interview.This key question is from Types of Cryptography in section Cryptography in Security of Cyber Security |
|
Answer» Correct answer is (a) Symmetric Key ENCRYPTION |
|