crypt hunt set - 1

12345678910111213141516171819
Across
  1. 4. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
  2. 6. A scheduling algorithm that assigns priorities based on the ratio of CPU time to waiting time.
  3. 9. Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
  4. 12. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
  5. 14. A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
  6. 16. A synchronization primitive used to protect critical sections of code by allowing only one thread to enter at a time and blocking others.
  7. 17. What type of attack floods a network with excessive traffic to overwhelm its capacity?
  8. 19. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
Down
  1. 1. A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
  2. 2. What security measure restricts access to a network based on the physical address of a
  3. 3. What type of attack targets the domain name system to redirect users to malicious websites?
  4. 5. Which cipher involves using a series of rotating disks or cylinders to scramble the
  5. 7. In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?
  6. 8. An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
  7. 10. A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
  8. 11. A class that allows multiple threads to read from or write to a shared resource without interference
  9. 13. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
  10. 15. In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
  11. 16. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
  12. 18. What is the name of the mathematical process used to reverse encryption?