Cryptic Hunt Set - 2
Across
- 6. A Java API for processing XML documents.
- 10. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- 14. What is the name of the mathematical process used to reverse encryption?
- 15. A technique used in file systems to delay the actual writing of data to disk until it is necessary, often to optimize disk I/O performance.
- 16. Which security measure authenticates the identity of users and devices before granting them access to a network?
- 17. What cryptographic protocol secures email communication by providing authentication and encryption?
- 18. A tool used to automatically generate code from a given set of rules or templates.
- 19. A tool used for continuous integration and continuous delivery in Java projects.
- 20. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
Down
- 1. What is the term for a cipher that uses different keys for different parts of the message?
- 2. What security measure is used to verify the identity of users and devices before granting access to a network?
- 3. A technique used in virtual memory systems to reduce the overhead of page table lookups by storing frequently used page table entries in a cache.
- 4. A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
- 5. A mechanism used to improve performance in multi-threaded applications by reducing contention on shared resources.
- 7. In the Vigenère cipher, what is the key used for encrypting the message?
- 8. What is the name of the method for generating round keys from the original cryptographic key?
- 9. A class that allows multiple threads to read from or write to a shared resource without interference.
- 11. What cryptographic technique involves mixing plaintext with a pseudorandom stream of bits?
- 12. The meet-in-the-middle attack is often used to break what type of encryption scheme?
- 13. What type of attack targets the domain name system to redirect users to malicious websites?