{"id":25457,"date":"2024-04-15T07:00:28","date_gmt":"2024-04-15T07:00:28","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=25457"},"modified":"2024-04-15T07:00:28","modified_gmt":"2024-04-15T07:00:28","slug":"which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/","title":{"rendered":"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature"},"content":{"rendered":"<p>[amp_mcq option1=&#8221;Encryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Wallets&#8221; option4=&#8221;Digital signature&#8221; correct=&#8221;option3&#8243;]<!--more--><\/p>\n<p>The correct answer is C. Wallets.<\/p>\n<p>A wallet is a physical or digital device that stores electronic money or cryptocurrency. It is not a security mechanism because it does not protect the data stored in it.<\/p>\n<p>Encryption is a process of converting data into a form that cannot be read by unauthorized people. Cryptography is the science of protecting information by transforming it into a form that cannot be understood without a secret key. Digital signatures are a way of verifying the authenticity of a digital document or message.<\/p>\n<p>All of these are security mechanisms that can be used to protect data. Wallets, on the other hand, are not security mechanisms. They are simply devices that store electronic money or cryptocurrency. The data stored in a wallet can be protected by encryption, but the wallet itself is not a security mechanism.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[amp_mcq option1=&#8221;Encryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Wallets&#8221; option4=&#8221;Digital signature&#8221; correct=&#8221;option3&#8243;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[696],"tags":[],"class_list":["post-25457","post","type-post","status-publish","format-standard","hentry","category-ecommerce","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature\" \/>\n<meta property=\"og:description\" content=\"[amp_mcq option1=&#8221;Encryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Wallets&#8221; option4=&#8221;Digital signature&#8221; correct=&#8221;option3&#8243;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T07:00:28+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/","og_locale":"en_US","og_type":"article","og_title":"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature","og_description":"[amp_mcq option1=&#8221;Encryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Wallets&#8221; option4=&#8221;Digital signature&#8221; correct=&#8221;option3&#8243;]","og_url":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2024-04-15T07:00:28+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/","url":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/","name":"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2024-04-15T07:00:28+00:00","dateModified":"2024-04-15T07:00:28+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-is-not-used-as-a-security-mechanism-a-encryption-b-cryptography-c-wallets-d-digital-signature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"mcq","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/"},{"@type":"ListItem","position":3,"name":"Commerce","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/commerce\/"},{"@type":"ListItem","position":4,"name":"Ecommerce","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/commerce\/ecommerce\/"},{"@type":"ListItem","position":5,"name":"Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/25457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=25457"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/25457\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=25457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=25457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=25457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}