Q. transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called (Solved)
1. Encryption, Decryption
2. Encryption, Availability
3. Authentication, Encryption
4. Confidentiality, Encryption
- a. Encryption, Decryption