1D3I ALL OF THE FOLLOWING ARE EXAMPLES OF ENCRYPTION TECHNIQUES USED...

261. CSO: 1D3c LOS: 1D3i

All of the following are examples of encryption techniques used for computer security

except

a. public key.

b. private key.

c. primary key.

d. authentication key.