in Education by
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without (a) Encryption key (b) Decryption key (c) Primary key (d) Authorised key I had been asked this question during an interview. This is a very interesting question from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management Select the correct answer from above options Interview Questions and Answers, Database Interview Questions and Answers for Freshers and Experience

1 Answer

0 votes
by
Right answer is (b) Decryption key Best explanation: Even if the message is intercepted by an enemy, the enemy, not knowing the key, will not be able to decrypt and understand the message.

Related questions

0 votes
    Story I'm using SQL Server database, and there is a table called aspnet_Membership that it seems like it' ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked May 7, 2022 in Education by JackTerrance
0 votes
    The technical aspects of data are handled by ____________ (1)Data administrator (2)Database Administrator (3)Database Steward...
asked May 19, 2021 in Technology by JackTerrance
0 votes
    SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are ... issue in a report-writing software. 1. True 2. False...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Can all hard problems be handled by a multilayer feedforward neural network, with nonlinear units? (a) yes ( ... Networks of Neural Networks Please answer the above question....
asked Sep 3, 2022 in Education by JackTerrance
0 votes
    The deadlock can be handled by (a) Removing the nodes that are deadlocked (b) Restarting the search after ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    What is the features that cannot be accomplished earlier without affine transformations? (a) arbitrary rotation (b) ... all of the mentioned Please answer the above question....
asked Sep 4, 2022 in Education by JackTerrance
0 votes
    What happens when an application takes user inputted data and sends it to a web browser without proper validation ... 2. Insecure direct object reference 3. Cross Site Scripting...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of ... was derived. (1)Relative Metrics (2)Absolute Metrics...
asked May 15, 2021 in Technology by JackTerrance
0 votes
    Where the address of operator (&) cannot be used?...
asked Jan 18, 2021 in Technology by JackTerrance
+1 vote
    Where the address of operator (&) cannot be used in C Programming?...
asked Nov 9, 2020 in Technology by JackTerrance
0 votes
    I used the example from here http://jqueryui.com/demos/dialog/#animated to create a dialog box. The ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 26, 2022 in Education by JackTerrance
0 votes
    A single ______________ further allows the user to be authenticated once, and multiple applications can then ... in chapter Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    I am using oracle 10g. I have a database user TDM_DD which executes a procedure in which it creates ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 3, 2022 in Education by JackTerrance
...