Question 5
Question 5 of 11

Question image for Q5
Topics Tested

Methods of encryption, including: symmetric (using private key only), asymmetric (using private and public keys)

The function of key fields, including: primary key, compound key, foreign key, composite key