GIC IT 2024 | 100 Most Important IT Questions for GIC Re IT | Cyber Security & Software Engineering

Поделиться
HTML-код
  • Опубликовано: 2 янв 2025

Комментарии • 2

  • @RitikaBarnwal-j9g
    @RitikaBarnwal-j9g 7 дней назад

    GIC ki descriptive topic ki video ek upload kr dijie, isse hm sab ki kaafi help ho jaegi ma'am 🙏

  • @soumyakmitra6496
    @soumyakmitra6496 5 дней назад

    Question no 26 is not option C , but option A because,
    In asymmetric encryption, public and private keys are mathematically paired, and they work interchangeably depending on the use case:
    a. For confidentiality: Data encrypted with the public key can only be decrypted with the private key.
    b. For authenticity and integrity: Data "signed" (encrypted) with the private key can be verified using the public key.