crypt hunt set - 1
Across
- 4. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
- 6. A scheduling algorithm that assigns priorities based on the ratio of CPU time to waiting time.
- 9. Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
- 12. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
- 14. A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
- 16. A synchronization primitive used to protect critical sections of code by allowing only one thread to enter at a time and blocking others.
- 17. What type of attack floods a network with excessive traffic to overwhelm its capacity?
- 19. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
Down
- 1. A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
- 2. What security measure restricts access to a network based on the physical address of a
- 3. What type of attack targets the domain name system to redirect users to malicious websites?
- 5. Which cipher involves using a series of rotating disks or cylinders to scramble the
- 7. In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?
- 8. An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
- 10. A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
- 11. A class that allows multiple threads to read from or write to a shared resource without interference
- 13. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- 15. In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
- 16. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- 18. What is the name of the mathematical process used to reverse encryption?