Question:

Match LIST-I with LIST-II 

\[\begin{array}{|c|l|}\hline \textbf{LIST-I} & \textbf{LIST-II} \\ \hline \text{A. Encipherment} & \text{The use of mathematical algorithms to transform data into a form that is not readily intelligible.} \\ \hline \text{B. Digital Signature} & \text{Cryptographic transformation of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.} \\ \hline \text{C. Access Control} & \text{A variety of mechanisms that enforce access rights to resources.} \\ \hline \text{D. Data Integrity} & \text{A variety of mechanisms used to assure the integrity of a data unit or stream of data units.} \\ \hline \end{array}\]
 

\[\text{Matching\ Items\ in\ LIST\-I\ with\ LIST\-II}\]

Show Hint

Encryption ensures data security, digital signatures guarantee authenticity, access control ensures only authorized access, and data integrity guarantees unaltered data.
Updated On: Sep 25, 2025
  • A - I, B - II, C - III, D - IV
  • A - I, B - II, C - III, D - IV
  • A - II, B - III, C - IV, D - I
  • A - III, B - IV, C - I, D - II
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is A

Solution and Explanation

\[\begin{array}{rl} \bullet & \text{Enciphement refers to the use of mathematical algorithms to convert data into an unreadable form, making it unintelligible.} \\ \bullet & \text{Digital Signature ensures the integrity and authenticity of a data unit by cryptographically transforming it to prevent forgery.} \\ \bullet & \text{Access Control consists of mechanisms used to enforce rules about which users or systems can access resources.} \\ \bullet & \text{Data Integrity focuses on ensuring that data is accurate, consistent, and has not been tampered with.} \\ \end{array}\] Final Answer: \[ \boxed{A - I, B - II, C - III, D - IV} \]
Was this answer helpful?
0
0

Questions Asked in CUET PG exam

View More Questions